Vulnerability Description
HTTP applications (servers) based on Crow through 1.0+4 may reveal potentially sensitive uninitialized data from stack memory when fulfilling a request for a static file smaller than 16 KB.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Crowcpp | Crow | 1.0\+4 |
Related Weaknesses (CWE)
References
- https://github.com/0xhebi/CVEs/blob/main/Crow/CVE-2022-38668.mdExploitThird Party Advisory
- https://github.com/CrowCpp/Crow/pull/523Third Party Advisory
- https://gynvael.coldwind.pl/?id=752ExploitThird Party Advisory
- https://github.com/0xhebi/CVEs/blob/main/Crow/CVE-2022-38668.mdExploitThird Party Advisory
- https://github.com/CrowCpp/Crow/pull/523Third Party Advisory
- https://gynvael.coldwind.pl/?id=752ExploitThird Party Advisory
FAQ
What is CVE-2022-38668?
CVE-2022-38668 is a vulnerability with a CVSS score of 7.5 (HIGH). HTTP applications (servers) based on Crow through 1.0+4 may reveal potentially sensitive uninitialized data from stack memory when fulfilling a request for a static file smaller than 16 KB.
How severe is CVE-2022-38668?
CVE-2022-38668 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-38668?
Check the references section above for vendor advisories and patch information. Affected products include: Crowcpp Crow.