Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer.
This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/np5gjqlohc4f62lr09vrn61vl44cylh8 | Mailing List Vendor Advisory |
https://security.netapp.com/advisory/ntap-20240315-0001/ | |
https://lists.apache.org/thread/np5gjqlohc4f62lr09vrn61vl44cylh8 | Mailing List Vendor Advisory |
https://security.netapp.com/advisory/ntap-20240315-0001/ |
Configurations
History
13 Feb 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Integer Overflow or Wraparound vulnerability in apr_base64 functions of Apache Portable Runtime Utility (APR-util) allows an attacker to write beyond bounds of a buffer. This issue affects Apache Portable Runtime Utility (APR-util) 1.6.1 and prior versions. |
Information
Published : 2023-01-31 16:15
Updated : 2025-02-13 17:15
NVD link : CVE-2022-25147
Mitre link : CVE-2022-25147
CVE.ORG link : CVE-2022-25147
JSON object : View
Products Affected
apache
- portable_runtime_utility
CWE
CWE-190
Integer Overflow or Wraparound