Lucene search

K
amazonAmazonALAS-2014-334
HistoryMay 06, 2014 - 10:19 p.m.

Medium: mod24_security

2014-05-0622:19:00
alas.aws.amazon.com
12

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.008 Low

EPSS

Percentile

81.7%

Issue Overview:

apache2/modsecurity.c in ModSecurity before 2.7.6 allows remote attackers to bypass rules by using chunked transfer coding with a capitalized Chunked value in the Transfer-Encoding HTTP header.

Affected Packages:

mod24_security

Issue Correction:
Run yum update mod24_security to update your system.

New Packages:

i686:  
    mod24_security-debuginfo-2.7.3-3.24.amzn1.i686  
    mod24_security-2.7.3-3.24.amzn1.i686  
    mlogc24-2.7.3-3.24.amzn1.i686  
  
src:  
    mod24_security-2.7.3-3.24.amzn1.src  
  
x86_64:  
    mod24_security-2.7.3-3.24.amzn1.x86_64  
    mlogc24-2.7.3-3.24.amzn1.x86_64  
    mod24_security-debuginfo-2.7.3-3.24.amzn1.x86_64  

Additional References

Red Hat: CVE-2013-5705

Mitre: CVE-2013-5705

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

0.008 Low

EPSS

Percentile

81.7%