Vulnerability Details : CVE-2013-2765
Potential exploit
The ModSecurity module before 2.7.4 for the Apache HTTP Server allows remote attackers to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2013-2765
- cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
- cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*When used together with: Apache » Http Server
Exploit prediction scoring system (EPSS) score for CVE-2013-2765
8.45%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-2765
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2013-2765
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-2765
-
https://github.com/shookalabs/exploits/blob/master/modsecurity_cve_2013_2765_check.py
exploits/modsecurity_cve_2013_2765_check.py at master · yjaaidi/exploits · GitHubExploit;Third Party Advisory
-
http://archives.neohapsis.com/archives/bugtraq/2013-05/0125.html
Broken Link
-
http://lists.opensuse.org/opensuse-updates/2013-08/msg00025.html
openSUSE-SU-2013:1336-1: moderate: update for apache2-mod_security2Mailing List;Third Party Advisory
-
http://www.shookalabs.com/
shookalabs.comThird Party Advisory
-
http://sourceforge.net/mailarchive/message.php?msg_id=30900019
ModSecurity / [mod-security-users] Availability of ModSecurity 2.7.4 Stable ReleaseThird Party Advisory
-
https://raw.github.com/SpiderLabs/ModSecurity/master/CHANGES
Broken Link
-
http://www.modsecurity.org/
ModSecurity: Open Source Web Application FirewallVendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=967615
967615 – (CVE-2013-2765) mod_security: NULL pointer dereference (DoS, crash) when forceRequestBodyVariable action triggered and unknown Content-Type was usedIssue Tracking;Patch;Third Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2013-08/msg00031.html
openSUSE-SU-2013:1342-1: moderate: update for apache2-mod_security2Mailing List;Third Party Advisory
-
https://github.com/SpiderLabs/ModSecurity/commit/0840b13612a0b7ef1ce7441cf811dcfc6b463fba
Fixed: chuck null pointer when unknown CT is sent and over in-memory … · SpiderLabs/ModSecurity@0840b13 · GitHubPatch;Third Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2013-08/msg00020.html
openSUSE-SU-2013:1331-1: moderate: update for apache2-mod_security2Mailing List;Third Party Advisory
Jump to