Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-33057 Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
Ubuntu USN Ubuntu USN USN-5487-1 Apache HTTP Server vulnerabilities
Ubuntu USN Ubuntu USN USN-5487-3 Apache HTTP Server regression
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 18 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-12-18T15:26:47.398Z

Reserved: 2022-04-04T00:00:00.000Z

Link: CVE-2022-28615

cve-icon Vulnrichment

Updated: 2024-08-03T05:56:16.195Z

cve-icon NVD

Status : Modified

Published: 2022-06-09T17:15:09.230

Modified: 2025-12-18T16:15:47.817

Link: CVE-2022-28615

cve-icon Redhat

Severity : Low

Publid Date: 2022-06-08T00:00:00Z

Links: CVE-2022-28615 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses