First published: Thu Oct 19 2023(Updated: )
Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server. This issue affects Apache HTTP Server: through 2.4.57. References: <a href="https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2023-31122">https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2023-31122</a> <a href="https://www.openwall.com/lists/oss-security/2023/10/19/4">https://www.openwall.com/lists/oss-security/2023/10/19/4</a> Upstream patch: <a href="https://svn.apache.org/viewvc?view=revision&revision=1912993">https://svn.apache.org/viewvc?view=revision&revision=1912993</a>
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP server | <=2.4.57 | |
Fedoraproject Fedora | =38 | |
redhat/httpd | <2.4.58 | 2.4.58 |
ubuntu/apache2 | <2.4.29-1ubuntu4.27+ | 2.4.29-1ubuntu4.27+ |
ubuntu/apache2 | <2.4.41-4ubuntu3.15 | 2.4.41-4ubuntu3.15 |
ubuntu/apache2 | <2.4.52-1ubuntu4.7 | 2.4.52-1ubuntu4.7 |
ubuntu/apache2 | <2.4.55-1ubuntu2.1 | 2.4.55-1ubuntu2.1 |
ubuntu/apache2 | <2.4.57-2ubuntu2.1 | 2.4.57-2ubuntu2.1 |
ubuntu/apache2 | <2.4.7-1ubuntu4.22+ | 2.4.7-1ubuntu4.22+ |
ubuntu/apache2 | <2.4.58-1 | 2.4.58-1 |
ubuntu/apache2 | <2.4.18-2ubuntu3.17+ | 2.4.18-2ubuntu3.17+ |
debian/apache2 | <=2.4.38-3+deb10u8<=2.4.38-3+deb10u10<=2.4.56-1~deb11u2<=2.4.57-2 | 2.4.59-1~deb11u1 2.4.59-1~deb12u1 2.4.58-1 2.4.59-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31122 is an out-of-bounds read vulnerability in mod_macro of Apache HTTP Server.
CVE-2023-31122 affects Apache HTTP Server versions up to and including 2.4.57.
The severity of CVE-2023-31122 is high with a CVSS score of 7.5.
To fix CVE-2023-31122, upgrade Apache HTTP Server to a version beyond 2.4.57.
Yes, you can find references for CVE-2023-31122 at the following links: 1. [https://httpd.apache.org/security/vulnerabilities_24.html](https://httpd.apache.org/security/vulnerabilities_24.html) 2. [https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC/](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC/) 3. [https://security.netapp.com/advisory/ntap-20231027-0011/](https://security.netapp.com/advisory/ntap-20231027-0011/)