First published: Fri Aug 23 2024(Updated: )
null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.1 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 | |
F5 F5OS-A | =1.7.0>=1.5.1<=1.5.2 | 1.8.0 |
F5 F5OS-C | >=1.6.0<=1.6.2 | 1.8.0 |
F5 Traffix Systems Signaling Delivery Controller | =5.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000140784 is significant due to the potential for attackers to crash the server.
To fix F5-K000140784, users should upgrade to Apache HTTP Server version 2.4.60 or later.
F5-K000140784 affects F5 BIG-IP versions 17.1.0 to 17.1.1, 16.1.0 to 16.1.5, 15.1.0 to 15.1.10, and F5OS versions 1.5.1 to 1.8.0.
Yes, F5-K000140784 can be exploited remotely via a malicious request to the affected server.
A null pointer dereference in F5-K000140784 refers to an error in the mod_proxy module that can lead to server crashes when improperly handling requests.