First published: Tue Jul 23 2013(Updated: )
mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP Server | >=2.4.1<=2.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2249 has a medium severity level due to potential remote attack vectors.
To fix CVE-2013-2249, upgrade the Apache HTTP Server to version 2.4.5 or later.
CVE-2013-2249 can lead to session handling issues, affecting session integrity.
Apache HTTP Server versions before 2.4.5, specifically 2.4.1 to 2.4.4, are affected by CVE-2013-2249.
Yes, CVE-2013-2249 has remote attack vectors, making it potentially exploitable from outside the network.