CVE-2022-34037Out-of-bounds Read in Caddyserver Caddy

CWE-125Out-of-bounds Read5 documents5 sources
Severity
7.5HIGHNVD
EPSS
0.6%
top 30.11%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 22
Latest updateJul 23

Description

An out-of-bounds read in the rewrite function at /modules/caddyhttp/rewrite/rewrite.go in Caddy v2.5.1 allows attackers to cause a Denial of Service (DoS) via a crafted URI. Note: This has been disputed as a bug, not a security vulnerability, in the Caddy web server that emerged when an administrator's bad configuration containing a malformed request URI caused the server to return an empty reply instead of a valid HTTP response to the client.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

Patches

🔴Vulnerability Details

3
GHSA
Withdrawn Advisory: Out-of-bounds Read can lead to client side denial of service2022-07-23
OSV
Withdrawn Advisory: Out-of-bounds Read can lead to client side denial of service2022-07-23
CVEList
CVE-2022-34037: An out-of-bounds read in the rewrite function at /modules/caddyhttp/rewrite/rewrite2022-07-22

📋Vendor Advisories

1
Red Hat
caddy: oob read allows for DoS2022-07-22
CVE-2022-34037 — Out-of-bounds Read | cvebase