Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-10097

Опубликовано: 14 авг. 2019
Источник: redhat
CVSS3: 6.6
EPSS Средний

Описание

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.

A vulnerability was discovered in Apache httpd, in mod_remoteip. A trusted proxy using the "PROXY" protocol could send specially crafted headers that can cause httpd to experience a stack buffer overflow or NULL pointer dereference, leading to a crash or other potential consequences. This issue could only be exploited by configured trusted intermediate proxy servers. HTTP clients such as browsers could not exploit the vulnerability.

Меры по смягчению последствий

This flaw is only exploitable if RemoteIP* directives are used in Apache httpd configuration. The following command can be used to search for possible vulnerable configurations: grep -R '^\s*RemoteIP' /etc/httpd/ See https://httpd.apache.org/docs/2.4/mod/mod_remoteip.html

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5httpdNot affected
Red Hat Enterprise Linux 6httpdNot affected
Red Hat Enterprise Linux 7httpdNot affected
Red Hat JBoss Enterprise Web Server 2httpdOut of support scope
Red Hat JBoss Enterprise Web Server 2httpd22Out of support scope
Red Hat JBoss Web Server 3httpd24Out of support scope
JBoss Core Services Apache HTTP Server 2.4.37 SP2httpdFixedRHSA-2020:133606.04.2020
JBoss Core Services on RHEL 6jbcs-httpd24-aprFixedRHSA-2020:133706.04.2020
JBoss Core Services on RHEL 6jbcs-httpd24-brotliFixedRHSA-2020:133706.04.2020
JBoss Core Services on RHEL 6jbcs-httpd24-httpdFixedRHSA-2020:133706.04.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-120
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=1743996httpd: null-pointer dereference in mod_remoteip

EPSS

Процентиль: 96%
0.27358
Средний

6.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.2
ubuntu
больше 5 лет назад

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.

CVSS3: 7.2
nvd
больше 5 лет назад

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.

CVSS3: 7.2
debian
больше 5 лет назад

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured ...

github
около 3 лет назад

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.

CVSS3: 7.2
fstec
почти 6 лет назад

Уязвимость модуля mod_remoteip веб-сервера Apache HTTP Server, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 96%
0.27358
Средний

6.6 Medium

CVSS3