vulnerability

Amazon Linux AMI 2: CVE-2019-10097: Security patch for httpd (ALAS-2019-1341)

Severity
6
CVSS
(AV:N/AC:M/Au:S/C:P/I:P/A:P)
Published
Sep 26, 2019
Added
Apr 27, 2020
Modified
Nov 27, 2024

Description

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.

Solutions

amazon-linux-ami-2-upgrade-httpdamazon-linux-ami-2-upgrade-httpd-debuginfoamazon-linux-ami-2-upgrade-httpd-develamazon-linux-ami-2-upgrade-httpd-filesystemamazon-linux-ami-2-upgrade-httpd-manualamazon-linux-ami-2-upgrade-httpd-toolsamazon-linux-ami-2-upgrade-mod_ldapamazon-linux-ami-2-upgrade-mod_mdamazon-linux-ami-2-upgrade-mod_proxy_htmlamazon-linux-ami-2-upgrade-mod_sessionamazon-linux-ami-2-upgrade-mod_ssl
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.