{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2022-22728","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","assignerShortName":"apache","dateUpdated":"2024-08-03T03:21:49.039Z","dateReserved":"2022-01-06T00:00:00.000Z","datePublished":"2022-08-25T00:00:00.000Z"},"containers":{"cna":{"title":"libapreq2 multipart form parse memory corruption","providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2023-05-03T00:00:00.000Z"},"descriptions":[{"lang":"en","value":"A flaw in Apache libapreq2 versions 2.16 and earlier could cause a buffer overflow while processing multipart form uploads. A remote attacker could send a request causing a process crash which could lead to a denial of service attack."}],"affected":[{"vendor":"Apache Software Foundation","product":"libapreq2","versions":[{"version":"unspecified","lessThanOrEqual":"2.16","status":"affected","versionType":"custom"}]}],"references":[{"url":"https://lists.apache.org/thread/2fsjoor96d47vtkpf76x4yo06nccvy1y"},{"name":"[oss-security] 20220825 Re: CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory corruption","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2022/08/25/4"},{"name":"[oss-security] 20220825 CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory corruption","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2022/08/25/3"},{"name":"[oss-security] 20220826 Re: CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory corruption","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2022/08/26/4"},{"name":"FEDORA-2022-9e5046934e","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2PUUS3JL44UUSLJTSXE46HVKZIW7E7PE/"},{"name":"FEDORA-2022-cf658a432f","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE5MEHGIQUEIISBCVHM43IN2NBDXBFOJ/"},{"name":"FEDORA-2022-61f5b492b7","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3HZZKVHYYWACPWONPEFRNPIRE3HYLV4T/"},{"name":"[oss-security] 20221229 Re: CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory corruption","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2022/12/29/1"},{"name":"[oss-security] 20221230 Re: CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory corruption","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2022/12/30/4"},{"name":"[oss-security] 20221231 Re: CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory corruption","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2022/12/31/1"},{"name":"[oss-security] 20221231 Re: CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory corruption","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2022/12/31/5"},{"name":"[oss-security] 20230102 Re: CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory corruption","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2023/01/02/1"},{"name":"[oss-security] 20230102 Re: CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory corruption","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2023/01/02/2"},{"name":"[oss-security] 20230103 Re: CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory corruption","tags":["mailing-list"],"url":"http://www.openwall.com/lists/oss-security/2023/01/03/2"},{"name":"[debian-lts-announce] 20230114 [SECURITY] [DLA 3269-1] libapreq2 security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00009.html"},{"name":"GLSA-202305-20","tags":["vendor-advisory"],"url":"https://security.gentoo.org/glsa/202305-20"}],"metrics":[{"other":{"type":"unknown","content":{"other":"important"}}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')","cweId":"CWE-120"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T03:21:49.039Z"},"title":"CVE Program Container","references":[{"url":"https://lists.apache.org/thread/2fsjoor96d47vtkpf76x4yo06nccvy1y","tags":["x_transferred"]},{"name":"[oss-security] 20220825 Re: CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory corruption","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2022/08/25/4"},{"name":"[oss-security] 20220825 CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory corruption","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2022/08/25/3"},{"name":"[oss-security] 20220826 Re: CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory corruption","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2022/08/26/4"},{"name":"FEDORA-2022-9e5046934e","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2PUUS3JL44UUSLJTSXE46HVKZIW7E7PE/"},{"name":"FEDORA-2022-cf658a432f","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BE5MEHGIQUEIISBCVHM43IN2NBDXBFOJ/"},{"name":"FEDORA-2022-61f5b492b7","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3HZZKVHYYWACPWONPEFRNPIRE3HYLV4T/"},{"name":"[oss-security] 20221229 Re: CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory corruption","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2022/12/29/1"},{"name":"[oss-security] 20221230 Re: CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory corruption","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2022/12/30/4"},{"name":"[oss-security] 20221231 Re: CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory corruption","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2022/12/31/1"},{"name":"[oss-security] 20221231 Re: CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory corruption","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2022/12/31/5"},{"name":"[oss-security] 20230102 Re: CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory corruption","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2023/01/02/1"},{"name":"[oss-security] 20230102 Re: CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory corruption","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2023/01/02/2"},{"name":"[oss-security] 20230103 Re: CVE-2022-22728: libapreq2: libapreq2 multipart form parse memory corruption","tags":["mailing-list","x_transferred"],"url":"http://www.openwall.com/lists/oss-security/2023/01/03/2"},{"name":"[debian-lts-announce] 20230114 [SECURITY] [DLA 3269-1] libapreq2 security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00009.html"},{"name":"GLSA-202305-20","tags":["vendor-advisory","x_transferred"],"url":"https://security.gentoo.org/glsa/202305-20"}]}]}}