Lucene search

K
amazonAmazonALAS-2022-1560
HistoryJan 18, 2022 - 8:14 p.m.

Important: httpd24

2022-01-1820:14:00
alas.aws.amazon.com
25

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.307 Low

EPSS

Percentile

96.9%

Issue Overview:

There’s a null pointer dereference and server-side request forgery flaw in httpd’s mod_proxy module, when it is configured to be used as a forward proxy. A crafted packet could be sent on the adjacent network to the forward proxy that could cause a crash, or potentially SSRF via misdirected Unix Domain Socket requests. In the worst case, this could cause a denial of service or compromise to confidentiality of data. (CVE-2021-44224)

A buffer overflow flaw in httpd’s lua module could allow an out-of-bounds write. An attacker who is able to submit a crafted request to an httpd instance that is using the lua module may be able to cause an impact to confidentiality, integrity, and/or availability. (CVE-2021-44790)

Affected Packages:

httpd24

Issue Correction:
Run yum update httpd24 to update your system.

New Packages:

i686:  
    mod24_ssl-2.4.52-1.95.amzn1.i686  
    httpd24-2.4.52-1.95.amzn1.i686  
    httpd24-devel-2.4.52-1.95.amzn1.i686  
    httpd24-tools-2.4.52-1.95.amzn1.i686  
    mod24_md-2.4.52-1.95.amzn1.i686  
    mod24_proxy_html-2.4.52-1.95.amzn1.i686  
    httpd24-debuginfo-2.4.52-1.95.amzn1.i686  
    mod24_session-2.4.52-1.95.amzn1.i686  
    mod24_ldap-2.4.52-1.95.amzn1.i686  
  
noarch:  
    httpd24-manual-2.4.52-1.95.amzn1.noarch  
  
src:  
    httpd24-2.4.52-1.95.amzn1.src  
  
x86_64:  
    mod24_ssl-2.4.52-1.95.amzn1.x86_64  
    httpd24-tools-2.4.52-1.95.amzn1.x86_64  
    mod24_ldap-2.4.52-1.95.amzn1.x86_64  
    httpd24-debuginfo-2.4.52-1.95.amzn1.x86_64  
    mod24_proxy_html-2.4.52-1.95.amzn1.x86_64  
    mod24_session-2.4.52-1.95.amzn1.x86_64  
    mod24_md-2.4.52-1.95.amzn1.x86_64  
    httpd24-devel-2.4.52-1.95.amzn1.x86_64  
    httpd24-2.4.52-1.95.amzn1.x86_64  

Additional References

Red Hat: CVE-2021-44224, CVE-2021-44790

Mitre: CVE-2021-44224, CVE-2021-44790

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.307 Low

EPSS

Percentile

96.9%