{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2021-44790","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","assignerShortName":"apache","dateUpdated":"2024-08-04T04:32:13.543Z","dateReserved":"2021-12-10T00:00:00.000Z","datePublished":"2021-12-20T00:00:00.000Z"},"containers":{"cna":{"title":"Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51 and earlier","providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2023-04-03T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier."}],"affected":[{"vendor":"Apache Software Foundation","product":"Apache HTTP Server","versions":[{"version":"Apache HTTP Server 2.4","status":"affected","lessThanOrEqual":"2.4.51","versionType":"custom"}]}],"references":[{"url":"http://httpd.apache.org/security/vulnerabilities_24.html"},{"name":"[oss-security] 20211220 CVE-2021-44790: Apache HTTP Server: Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51 and earlier","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2021/12/20/4"},{"name":"FEDORA-2021-29a536c2ae","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/"},{"name":"DSA-5035","tags":["vendor-advisory"],"url":"https://www.debian.org/security/2022/dsa-5035"},{"url":"https://www.oracle.com/security-alerts/cpujan2022.html"},{"url":"https://security.netapp.com/advisory/ntap-20211224-0001/"},{"url":"https://www.tenable.com/security/tns-2022-01"},{"url":"https://www.tenable.com/security/tns-2022-03"},{"name":"FEDORA-2022-b4103753e9","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/"},{"name":"FEDORA-2022-21264ec6db","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/"},{"name":"FEDORA-2022-78e3211c55","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/"},{"url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"url":"https://support.apple.com/kb/HT213257"},{"url":"https://support.apple.com/kb/HT213256"},{"url":"https://support.apple.com/kb/HT213255"},{"name":"20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2022/May/33"},{"name":"20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2022/May/35"},{"name":"20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4","tags":["mailing-list"],"url":"http://seclists.org/fulldisclosure/2022/May/38"},{"name":"GLSA-202208-20","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202208-20"},{"url":"http://packetstormsecurity.com/files/171631/Apache-2.4.x-Buffer-Overflow.html"}],"credits":[{"lang":"en","value":"Chamal"},{"lang":"en","value":"Anonymous working with Trend Micro Zero Day Initiative"}],"metrics":[{"other":{"type":"unknown","content":{"other":"high"}}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-787 Out-of-bounds Write","cweId":"CWE-787"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"discovery":"UNKNOWN"},"timeline":[{"lang":"en","time":"2021-12-07T00:00:00.000Z","value":"Reported to security team"},{"lang":"en","time":"2021-12-16T00:00:00.000Z","value":"Fixed by r1896039 in 2.4.x"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T04:32:13.543Z"},"title":"CVE Program Container","references":[{"url":"http://httpd.apache.org/security/vulnerabilities_24.html","tags":["x_transferred"]},{"name":"[oss-security] 20211220 CVE-2021-44790: Apache HTTP Server: Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51 and earlier","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2021/12/20/4"},{"name":"FEDORA-2021-29a536c2ae","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/"},{"name":"DSA-5035","tags":["vendor-advisory","x_transferred"],"url":"https://www.debian.org/security/2022/dsa-5035"},{"url":"https://www.oracle.com/security-alerts/cpujan2022.html","tags":["x_transferred"]},{"url":"https://security.netapp.com/advisory/ntap-20211224-0001/","tags":["x_transferred"]},{"url":"https://www.tenable.com/security/tns-2022-01","tags":["x_transferred"]},{"url":"https://www.tenable.com/security/tns-2022-03","tags":["x_transferred"]},{"name":"FEDORA-2022-b4103753e9","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/"},{"name":"FEDORA-2022-21264ec6db","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/"},{"name":"FEDORA-2022-78e3211c55","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/"},{"url":"https://www.oracle.com/security-alerts/cpuapr2022.html","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT213257","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT213256","tags":["x_transferred"]},{"url":"https://support.apple.com/kb/HT213255","tags":["x_transferred"]},{"name":"20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2022/May/33"},{"name":"20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2022/May/35"},{"name":"20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4","tags":["mailing-list","x_transferred"],"url":"http://seclists.org/fulldisclosure/2022/May/38"},{"name":"GLSA-202208-20","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202208-20"},{"url":"http://packetstormsecurity.com/files/171631/Apache-2.4.x-Buffer-Overflow.html","tags":["x_transferred"]}]}]}}