Kaspersky ID:
KLA12554
Date de la détection:
06/08/2022
Mis à jour:
03/02/2026

Description

Multiple vulnerabilities were found in Apache HTTP Server. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. Out of bounds read vulnerability in ap_rwrite can be exploited to cause denial of service.
  2. HTTP request smuggling vulnerability in mod_proxy_ajp can be exploited to bypass security restrictions.
  3. Security vulnerability in mod_proxy can be exploited to bypass security restrictions.
  4. Out of bounds read vulnerability in mod_isapi can be exploited to cause denial of service.
  5. Information disclosure vulnerability in mod_lua can be exploited to obtain sensitive information.
  6. Denial of service vulnerability in mod_sed can be exploited to cause denial of service.
  7. Out of bounds read vulnerability in ap_strcmp_match can be exploited to cause denial of service.
  8. Denial of service vulnerability in mod_lua r:parsebody can be exploited to cause denial of service.

Fiches de renseignement originales

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Produits associés

Liste CVE

  • CVE-2022-28614
    high
  • CVE-2022-26377
    critical
  • CVE-2022-31813
    critical
  • CVE-2022-28330
    high
  • CVE-2022-30556
    critical
  • CVE-2022-30522
    critical
  • CVE-2022-28615
    critical
  • CVE-2022-29404
    critical

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.