oss-sec mailing list archives
CVE-2019-10097: mod_remoteip stack buffer overflow and NULL pointer dereference
From: Daniel Ruggeri <druggeri () apache org>
Date: Wed, 14 Aug 2019 15:50:09 -0500
CVE-2019-10097: mod_remoteip stack buffer overflow and NULL pointer dereference Severity: Moderate Vendor: The Apache Software Foundation Versions Affected: httpd 2.4.32 to 2.4.39 Description: When mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients. PROXY protocol support was added to mod_remoteip in release 2.4.33. Mitigation: All httpd users should upgrade to 2.4.41 or later. Credit: The issue was discovered by Daniel McCarney <cpu () letsencrypt org> Let's Encrypt / Internet Security Research Group (ISRG) References: https://httpd.apache.org/security/vulnerabilities_24.html
Current thread:
- CVE-2019-10097: mod_remoteip stack buffer overflow and NULL pointer dereference Daniel Ruggeri (Aug 15)