[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-4509-1 apache2 -- apache2

ID: oval:org.secpod.oval:def:604505Date: (C)2019-09-04   (M)2024-04-17
Class: PATCHFamily: unix




Several vulnerabilities have been found in the Apache HTTPD server. CVE-2019-9517 Jonathan Looney reported that a malicious client could perform a denial of service attack by flooding a connection with requests and basically never reading responses on the TCP connection. CVE-2019-10081 Craig Young reported that HTTP/2 PUSHes could lead to an overwrite of memory in the pushing request"s pool, leading to crashes. CVE-2019-10082 Craig Young reported that the HTTP/2 session handling could be made to read memory after being freed, during connection shutdown. CVE-2019-10092 Matei quot;Malquot; Badanoiu reported a limited cross-site scripting vulnerability in the mod_proxy error page. CVE-2019-10097 Daniel McCarney reported that when mod_remoteip was configured to use a trusted intermediary proxy server using the quot;PROXYquot; protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients. The issue does not affect the stretch release. CVE-2019-10098 Yukitsugu Sasaki reported a potential open redirect vulnerability in the mod_rewrite module.

Platform:
Debian 10.x
Debian 9.x
Product:
libapache2-mod-md
apache2
libapache2-mod-proxy-uwsgi
Reference:
DSA-4509-1
CVE-2019-9517
CVE-2019-10081
CVE-2019-10082
CVE-2019-10092
CVE-2019-10097
CVE-2019-10098
CVE    6
CVE-2019-10097
CVE-2019-10098
CVE-2019-10082
CVE-2019-10081
...
CPE    3
cpe:/o:debian:debian_linux:9.0
cpe:/a:apache:apache2
cpe:/o:debian:debian_linux:9.x

© SecPod Technologies