RHEL 7 / 8 : Red Hat JBoss Core Services Apache HTTP Server 2.4.51 SP1 (RHSA-2022:8840)

critical Nessus Plugin ID 168498

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 7 / 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2022:8840 advisory.

- openssl: c_rehash script allows command injection (CVE-2022-1292)

- openssl: the c_rehash script allows command injection (CVE-2022-2068)

- httpd: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-22721)

- httpd: mod_sed: Read/write beyond bounds (CVE-2022-23943)

- httpd: mod_proxy_ajp: Possible request smuggling (CVE-2022-26377)

- curl: CERTINFO never-ending busy-loop (CVE-2022-27781)
- httpd: Out-of-bounds read via ap_rwrite() (CVE-2022-28614)

- httpd: Out-of-bounds read in ap_strcmp_match() (CVE-2022-28615)

- httpd: mod_sed: DoS vulnerability (CVE-2022-30522)

- httpd: mod_proxy: X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813)

- curl: HTTP compression denial of service (CVE-2022-32206)

- curl: Unpreserved file permissions (CVE-2022-32207)

- curl: FTP-KRB bad message verification (CVE-2022-32208)

- curl: POST following PUT confusion (CVE-2022-32221)

- curl: control code in cookie denial of service (CVE-2022-35252)

- curl: HTTP proxy double-free (CVE-2022-42915)

- curl: HSTS bypass via IDN (CVE-2022-42916)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/cve/CVE-2022-1292

https://access.redhat.com/security/cve/CVE-2022-2068

https://access.redhat.com/security/cve/CVE-2022-22721

https://access.redhat.com/security/cve/CVE-2022-23943

https://access.redhat.com/security/cve/CVE-2022-26377

https://access.redhat.com/security/cve/CVE-2022-28614

https://access.redhat.com/security/cve/CVE-2022-28615

https://access.redhat.com/security/cve/CVE-2022-30522

https://access.redhat.com/security/cve/CVE-2022-31813

https://access.redhat.com/security/cve/CVE-2022-32206

https://access.redhat.com/security/cve/CVE-2022-32207

https://access.redhat.com/security/cve/CVE-2022-32208

https://access.redhat.com/security/cve/CVE-2022-32221

https://access.redhat.com/security/cve/CVE-2022-35252

https://access.redhat.com/security/cve/CVE-2022-42915

https://access.redhat.com/security/cve/CVE-2022-42916

https://access.redhat.com/errata/RHSA-2022:8840

https://bugzilla.redhat.com/2064319

https://bugzilla.redhat.com/2064320

https://bugzilla.redhat.com/2081494

https://bugzilla.redhat.com/2094997

https://bugzilla.redhat.com/2095002

https://bugzilla.redhat.com/2095006

https://bugzilla.redhat.com/2095015

https://bugzilla.redhat.com/2095020

https://bugzilla.redhat.com/2097310

https://bugzilla.redhat.com/2099300

https://bugzilla.redhat.com/2099305

https://bugzilla.redhat.com/2099306

https://bugzilla.redhat.com/2120718

https://bugzilla.redhat.com/2135411

https://bugzilla.redhat.com/2135413

https://bugzilla.redhat.com/2135416

Plugin Details

Severity: Critical

ID: 168498

File Name: redhat-RHSA-2022-8840.nasl

Version: 1.6

Type: local

Agent: unix

Published: 12/8/2022

Updated: 1/23/2023

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

CVSS Score Source: CVE-2022-2068

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

CVSS Score Source: CVE-2022-42915

Vulnerability Information

CPE: cpe:/o:redhat:enterprise_linux:7, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-devel, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-ldap, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-mysql, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-nss, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-odbc, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-openssl, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-pgsql, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-apr-util-sqlite, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-curl, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-httpd, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-httpd-devel, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-httpd-manual, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-httpd-selinux, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-httpd-tools, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-libcurl, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-libcurl-devel, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_http2, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_jk-ap24, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_ldap, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_md, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_proxy_cluster, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_proxy_html, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_security, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_session, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-mod_ssl, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-nghttp2, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-nghttp2-devel, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-openssl, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-openssl-chil, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-openssl-devel, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-openssl-libs, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-openssl-perl, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-openssl-pkcs11, p-cpe:/a:redhat:enterprise_linux:jbcs-httpd24-openssl-static

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 12/8/2022

Vulnerability Publication Date: 3/14/2022

Reference Information

CVE: CVE-2022-1292, CVE-2022-2068, CVE-2022-22721, CVE-2022-23943, CVE-2022-26377, CVE-2022-27781, CVE-2022-28614, CVE-2022-28615, CVE-2022-30522, CVE-2022-31813, CVE-2022-32206, CVE-2022-32207, CVE-2022-32208, CVE-2022-32221, CVE-2022-35252, CVE-2022-42915, CVE-2022-42916

RHSA: 2022:8840

CWE: 77, 125, 190, 200, 281, 319, 345, 348, 415, 440, 444, 770, 787, 789, 835, 924, 1286