|
Message-ID: <1565815809.0ELYBFHH@httpd.apache.org> Date: Wed, 14 Aug 2019 15:50:09 -0500 From: Daniel Ruggeri <druggeri@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2019-10097: mod_remoteip stack buffer overflow and NULL pointer dereference CVE-2019-10097: mod_remoteip stack buffer overflow and NULL pointer dereference Severity: Moderate Vendor: The Apache Software Foundation Versions Affected: httpd 2.4.32 to 2.4.39 Description: When mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients. PROXY protocol support was added to mod_remoteip in release 2.4.33. Mitigation: All httpd users should upgrade to 2.4.41 or later. Credit: The issue was discovered by Daniel McCarney <cpu@...sencrypt.org> Let's Encrypt / Internet Security Research Group (ISRG) References: https://httpd.apache.org/security/vulnerabilities_24.html
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.