Description
On Windows, Apache Portable Runtime 1.7.0 and earlier may write beyond the end of a stack based buffer in apr_socket_sendv(). This is a result of integer overflow.
Published: 2023-01-31
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-32783 On Windows, Apache Portable Runtime 1.7.0 and earlier may write beyond the end of a stack based buffer in apr_socket_sendv(). This is a result of integer overflow.
History

Thu, 27 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Apache Portable Runtime
Microsoft Windows
Redhat Jboss Core Services Jboss Enterprise Web Server
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-03-27T14:31:30.494Z

Reserved: 2022-04-01T12:46:04.617Z

Link: CVE-2022-28331

cve-icon Vulnrichment

Updated: 2024-08-03T05:56:14.939Z

cve-icon NVD

Status : Modified

Published: 2023-01-31T16:15:08.977

Modified: 2025-03-27T15:15:37.330

Link: CVE-2022-28331

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-01-31T00:00:00Z

Links: CVE-2022-28331 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses