4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.003 Low
EPSS
Percentile
65.3%
Debian Security Advisory DSA-2506-1 [email protected]
http://www.debian.org/security/ Yves-Alexis Perez
July 02, 2012 http://www.debian.org/security/faq
Package : libapache-mod-security
Vulnerability : modsecurity bypass
Problem type : remote
Debian-specific: no
CVE ID : CVE-2012-2751
Debian Bug : #678529
Qualys Vulnerability & Malware Research Labs discovered a vulnerability in
ModSecurity, a security module for the Apache webserver. In situations where
both 'Content:Disposition: attachment' and 'Content-Type: multipart' were
present in HTTP headers, the vulernability could allow an attacker to bypass
policy and execute cross-site script (XSS) attacks through properly crafted
HTML documents.
For the stable distribution (squeeze), this problem has been fixed in
version 2.5.12-1+squeeze1.
For the testing distribution (wheezy), this problem has been fixed in
version 2.6.6-1.
For the unstable distribution (sid), this problem has been fixed in
version 2.6.6-1.
In testing and unstable distribution, the source package has been renamed to
modsecurity-apache.
We recommend that you upgrade your libapache-mod-security packages.
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/
Mailing list: [email protected]
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 6 | all | libapache-mod-security | <ย 2.5.12-1+squeeze1 | libapache-mod-security_2.5.12-1+squeeze1_all.deb |
Debian | 6 | all | mod-security-common | <ย 2.5.12-1+squeeze1 | mod-security-common_2.5.12-1+squeeze1_all.deb |