5
CVSSv2

CVE-2013-2765

Published: 15/07/2013 Updated: 10/02/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The ModSecurity module prior to 2.7.4 for the Apache HTTP Server allows remote malicious users to cause a denial of service (NULL pointer dereference, process crash, and disk consumption) via a POST request with a large body and a crafted Content-Type header.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

trustwave modsecurity

opensuse opensuse 11.4

opensuse opensuse 12.2

opensuse opensuse 12.3

Vendor Advisories

Debian Bug report logs - #710217 modsecurity-apache: CVE-2013-2765: NULL pointer dereference Package: modsecurity-apache; Maintainer for modsecurity-apache is Alberto Gonzalez Iniesta <agi@inittaborg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 29 May 2013 07:21:01 UTC Severity: grave Tags: pat ...

Exploits

Source: packetstormsecuritycom/files/121815/modsecurity_cve_2013_2765_checkpytxt When ModSecurity receives a request body with a size bigger than the value set by the "SecRequestBodyInMemoryLimit" and with a "Content-Type" that has no request body processor mapped to it, ModSecurity will systematically crash on every call to "forceRequest ...