安全公告/【CVE-2019-10097】

基本信息

漏洞名称:
受影响操作系统:桌面操作系统
危险等级:高危
影响源码包:apache2
CVSS评分:7.2
发现日期:2023-07-21
修复版本:2.4.38-3+deb10u4

漏洞描述

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.

修复方式

sudo apt update && sudo apt dist-upgrade

漏洞判定

执行命令apt policy PackageName获取软件包版本号,版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复

补丁

参考

https://security-tracker.debian.org/tracker/CVE-2019-10097
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10097
https://nvd.nist.gov/vuln/detail/CVE-2019-10097