First published: Mon May 27 2013(Updated: )
Description of problem: Modsecurity 2.7.4 was released today, according to the changelog there a null pointer dereference flaw ..... Security Issues: * Fixed Remote Null Pointer DeReference (<a href="https://access.redhat.com/security/cve/CVE-2013-2765">CVE-2013-2765</a>). When forceRequestBodyVariable action is triggered and a unknown Content-Type is used, mod_security will crash trying to manipulate msr->msc_reqbody_chunks->elts however msr->msc_reqbody_chunks is NULL. (Thanks Younes JAAIDI). ...... URL: <a href="https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES">https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ModSecurity | <2.7.4 | 2.7.4 |
Trustwave ModSecurity | <2.7.4 | |
Apache HTTP server | ||
openSUSE openSUSE | =11.4 | |
openSUSE openSUSE | =12.2 | |
openSUSE openSUSE | =12.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.