First published: Wed Aug 14 2019(Updated: )
A vulnerability was discovered in Apache httpd, in mod_remoteip. A trusted proxy using the "PROXY" protocol could send specially crafted headers that can cause httpd to experience a stack buffer overflow or NULL pointer dereference, leading to a crash or other potential consequences. This issue could only be exploited by configured trusted intermediate proxy servers. HTTP clients such as browsers could not exploit the vulnerability.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-apr | <0:1.6.3-86.jbcs.el6 | 0:1.6.3-86.jbcs.el6 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-21.jbcs.el6 | 0:1.0.6-21.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-52.jbcs.el6 | 0:2.4.37-52.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.1.1c-16.jbcs.el6 | 1:1.1.1c-16.jbcs.el6 |
redhat/jbcs-httpd24-apr | <0:1.6.3-86.jbcs.el7 | 0:1.6.3-86.jbcs.el7 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-21.jbcs.el7 | 0:1.0.6-21.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-52.jbcs.el7 | 0:2.4.37-52.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.1.1c-16.jbcs.el7 | 1:1.1.1c-16.jbcs.el7 |
redhat/httpd24 | <0:1.1-19.el6 | 0:1.1-19.el6 |
redhat/httpd24-httpd | <0:2.4.34-15.el6 | 0:2.4.34-15.el6 |
redhat/httpd24-nghttp2 | <0:1.7.1-8.el6 | 0:1.7.1-8.el6 |
redhat/httpd24 | <0:1.1-19.el7 | 0:1.1-19.el7 |
redhat/httpd24-httpd | <0:2.4.34-15.el7 | 0:2.4.34-15.el7 |
redhat/httpd24-nghttp2 | <0:1.7.1-8.el7 | 0:1.7.1-8.el7 |
Apache HTTP server | =2.4.33 | |
Apache HTTP server | =2.4.34 | |
Apache HTTP server | =2.4.35 | |
Apache HTTP server | =2.4.37 | |
Apache HTTP server | =2.4.38 | |
Oracle Communications Element Manager | =8.0.0 | |
Oracle Communications Element Manager | =8.1.0 | |
Oracle Communications Element Manager | =8.1.1 | |
Oracle Communications Element Manager | =8.2.0 | |
Oracle Communications Session Report Manager | =8.1.1 | |
Oracle Communications Session Report Manager | =8.2.0 | |
Oracle Communications Session Report Manager | =8.2.1 | |
Oracle Communications Session Route Manager | =8.1.1 | |
Oracle Communications Session Route Manager | =8.2.0 | |
Oracle Communications Session Route Manager | =8.2.1 | |
Oracle Enterprise Manager Ops Center | =12.3.3 | |
Oracle Enterprise Manager Ops Center | =12.4.0 | |
Oracle HTTP Server | =12.2.1.4.0 | |
Oracle Instantis Enterprisetrack | >=17.1<=17.3 | |
Oracle Retail Xstore Point of Service | =7.1 | |
redhat/httpd | <2.4.41 | 2.4.41 |
debian/apache2 | 2.4.62-1~deb11u1 2.4.61-1~deb11u1 2.4.62-1~deb12u1 2.4.62-1~deb12u2 2.4.62-3 |
This flaw is only exploitable if RemoteIP* directives are used in Apache httpd configuration. The following command can be used to search for possible vulnerable configurations: grep -R '^\s*RemoteIP' /etc/httpd/ See https://httpd.apache.org/docs/2.4/mod/mod_remoteip.html
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2019-10097 is a vulnerability discovered in Apache HTTP Server 2.4.32-2.4.39 when mod_remoteip is configured to use a trusted intermediary.
The severity of CVE-2019-10097 is medium with a CVSS score of 6.6.
CVE-2019-10097 can cause Apache httpd to experience a stack buffer overflow or NULL pointer dereference, leading to a crash or other potential consequences.
Versions 2.4.32 to 2.4.39 of Apache httpd are affected by CVE-2019-10097.
To fix CVE-2019-10097, upgrade to version 2.4.41 of Apache httpd.