Network-connected storage (NAS) appliance maker QNAP on Thursday stated it is really investigating its lineup for probable effects arising from two security vulnerabilities that have been addressed in the Apache HTTP server previous thirty day period.
The critical flaws, tracked as CVE-2022-22721 and CVE-2022-23943, are rated 9.8 for severity on the CVSS scoring method and impression Apache HTTP Server variations 2.4.52 and previously –
- CVE-2022-22721 – Possible buffer overflow with incredibly huge or unlimited LimitXMLRequestBody
- CVE-2022-23943 – Out-of-bounds Create vulnerability in mod_sed of Apache HTTP Server
The two the vulnerabilities, alongside CVE-2022-22719 and CVE-2022-22720, were remediated by the task maintainers as component of model 2.4.53, which was delivered on March 14, 2022.
“Though CVE-2022-22719 and CVE-2022-22720 do not affect QNAP goods, CVE-2022-22721 has an effect on 32-little bit QNAP NAS types, and CVE-2022-23943 affects people who have enabled mod_sed in Apache HTTP Server on their QNAP product,” the Taiwanese enterprise explained in an notify printed this 7 days.
In the absence of readily accessible security updates, QNAP has made available workarounds, including “retaining the default benefit ‘1M’ for LimitXMLRequestBody” and disabling mod_sed, introducing that the mod_sed feature is disabled by default in Apache HTTP Server on NAS units running the QTS running process.
The advisory will come virtually a thirty day period after it disclosed that it is really doing the job to solve an infinite loop vulnerability in OpenSSL (CVE-2022-0778, CVSS rating: 7.5) and produced patches for the Dirty Pipe Linux flaw (CVE-2022-0847, CVSS score: 7.8).
Observed this write-up interesting? Abide by THN on Facebook, Twitter and LinkedIn to go through additional special information we submit.
Some components of this post are sourced from: