Summary: | <www-apache/mod_security-2.7.4 : "forceRequestBodyVariable" NULL Pointer Dereference Vulnerability (CVE-2013-2765) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | flameeyes |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://secunia.com/advisories/53535/ | ||
Whiteboard: | B3 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() Okay this is ready in tree for stabilization IMHO. Arches, please test and mark stable: =www-apache/mod_security-2.7.4 Target keywords : "amd64 ppc sparc x86" x86 stable amd64 stable sparc stable ppc stable CVE-2013-2765 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2765): The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header. Thanks for your work GLSA vote: no GLSA vote: no. Closing as [noglsa] |