First published: Mon May 27 2013(Updated: )
Description of problem: Modsecurity 2.7.4 was released today, according to the changelog there a null pointer dereference flaw ..... Security Issues: * Fixed Remote Null Pointer DeReference (<a href="https://access.redhat.com/security/cve/CVE-2013-2765">CVE-2013-2765</a>). When forceRequestBodyVariable action is triggered and a unknown Content-Type is used, mod_security will crash trying to manipulate msr->msc_reqbody_chunks->elts however msr->msc_reqbody_chunks is NULL. (Thanks Younes JAAIDI). ...... URL: <a href="https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES">https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ModSecurity | <2.7.4 | 2.7.4 |
Trustwave ModSecurity | <2.7.4 | |
Apache HTTP Server | ||
SUSE Linux | =11.4 | |
SUSE Linux | =12.2 | |
SUSE Linux | =12.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2765 has been rated as a moderate severity vulnerability due to its potential for remote exploitation.
To fix CVE-2013-2765, upgrade ModSecurity to version 2.7.4 or later.
CVE-2013-2765 is caused by a null pointer dereference flaw in ModSecurity.
ModSecurity versions prior to 2.7.4 are affected by CVE-2013-2765.
There is no official workaround for CVE-2013-2765; upgrading to the patched version is recommended.