Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-10097

Опубликовано: 26 сент. 2019
Источник: debian
EPSS Средний

Описание

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apache2fixed2.4.41-1package
apache2fixed2.4.38-3+deb10u1busterpackage
apache2not-affectedstretchpackage
apache2not-affectedjessiepackage

Примечания

  • Affects upstream versions 2.4.32 to 2.4.39

  • https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-10097

  • https://svn.apache.org/r1864613

EPSS

Процентиль: 96%
0.27358
Средний

Связанные уязвимости

CVSS3: 7.2
ubuntu
больше 5 лет назад

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.

CVSS3: 6.6
redhat
почти 6 лет назад

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.

CVSS3: 7.2
nvd
больше 5 лет назад

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.

github
около 3 лет назад

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.

CVSS3: 7.2
fstec
почти 6 лет назад

Уязвимость модуля mod_remoteip веб-сервера Apache HTTP Server, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 96%
0.27358
Средний