The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header.
References
Link | Resource |
---|---|
https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES | Broken Link |
http://www.modsecurity.org/ | Vendor Advisory |
http://www.shookalabs.com/ | Third Party Advisory |
https://github.com/shookalabs/exploits/blob/master/modsecurity_cve_2013_2765_check.py | Exploit Third Party Advisory |
http://sourceforge.net/mailarchive/message.php?msg_id=30900019 | Third Party Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=967615 | Issue Tracking Patch Third Party Advisory |
https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba | Patch Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html | Mailing List Third Party Advisory |
http://archives.neohapsis.com/archives/bugtraq/2013-05/0125.html | Broken Link |
Configurations
Information
Published : 2013-07-15 08:55
Updated : 2021-02-10 07:57
NVD link : CVE-2013-2765
Mitre link : CVE-2013-2765
JSON object : View
CWE
CWE-476
NULL Pointer Dereference
Products Affected
trustwave
- modsecurity
apache
- http_server
opensuse
- opensuse