Description
In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4509-1 | apache2 security update |
Ubuntu USN |
USN-4113-1 | Apache HTTP Server vulnerabilities |
References
History
No history.
Subscriptions
Apache
Subscribe
Http Server
Subscribe
Oracle
Subscribe
Communications Element Manager
Subscribe
Communications Session Report Manager
Subscribe
Communications Session Route Manager
Subscribe
Enterprise Manager Ops Center
Subscribe
Http Server
Subscribe
Instantis Enterprisetrack
Subscribe
Retail Xstore Point Of Service
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Jboss Core Services
Subscribe
Rhel Software Collections
Subscribe
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T22:10:09.873Z
Reserved: 2019-03-26T00:00:00.000Z
Link: CVE-2019-10097
No data.
Status : Modified
Published: 2019-09-26T16:15:10.673
Modified: 2024-11-21T04:18:23.890
Link: CVE-2019-10097
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN