Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <1565815809.0ELYBFHH@httpd.apache.org>
Date: Wed, 14 Aug 2019 15:50:09 -0500
From: Daniel Ruggeri <druggeri@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2019-10097: mod_remoteip stack buffer overflow and NULL pointer dereference


CVE-2019-10097: mod_remoteip stack buffer overflow and NULL pointer dereference

Severity: Moderate

Vendor: The Apache Software Foundation

Versions Affected:
httpd 2.4.32 to 2.4.39

Description:
When mod_remoteip was configured to use a trusted intermediary proxy
server using the "PROXY" protocol, a specially crafted PROXY header
could trigger a stack buffer overflow or NULL pointer deference.
This vulnerability could only be triggered by a trusted proxy and not
by untrusted HTTP clients.

PROXY protocol support was added to mod_remoteip in release 2.4.33.

Mitigation:
All httpd users should upgrade to 2.4.41 or later.

Credit:
The issue was discovered by Daniel McCarney <cpu@...sencrypt.org> Let's Encrypt / Internet Security Research Group (ISRG)

References:
https://httpd.apache.org/security/vulnerabilities_24.html

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.