Korean
<< Back
VID 210234
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The version of Apache httpd installed on the remote host is prior to 2.4.55. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.55 advisory.

- A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier. (CVE-2006-20001)
- Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.
(CVE-2022-36760)
- Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client. (CVE-2022-37436)

* References:
https://httpd.apache.org/security/vulnerabilities_24.html

* Platforms Affected:
Apache HTTP versions 2.4.x prior to 2.4.55
Any operating system Any version
Recommendation Upgrade to the latest version of Apache HTTP Server (2.4.55 or later), available from the Apache Software Foundation download site, http://httpd.apache.org/download.cgi
Related URL CVE-2006-20001,CVE-2022-36760,CVE-2022-37436 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)