Apache.httpd.mod_sed.Integer.Overflow
Description
This indicates an attack attempt to exploit an Integer Overflow Vulnerability in Apache Software Foundation httpd.
The vulnerability is due to mixing signed and unsigned values when processing mod_sed requests. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted request to the target server. Successful exploitation could lead to remote code execution under the security context of the server process, while an unsuccessful attack could lead to a denial-of-service condition.
Affected Products
Apache Software Foundation httpd prior to 2.4.53
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://httpd.apache.org/security/vulnerabilities_24.html#2.4.53
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |