CVE-2009-1902

The multipart processor in ModSecurity before 2.5.9 allows remote attackers to cause a denial of service (crash) via a multipart form datapost request with a missing part header name, which triggers a NULL pointer dereference.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html Not Applicable
http://secunia.com/advisories/34256 Third Party Advisory
http://secunia.com/advisories/34311 Third Party Advisory
http://secunia.com/advisories/35687 Third Party Advisory
http://security.gentoo.org/glsa/glsa-200907-02.xml Third Party Advisory
http://sourceforge.net/project/shownotes.php?release_id=667542&group_id=68846 Third Party Advisory
http://www.osvdb.org/52553 Broken Link
http://www.securityfocus.com/archive/1/501968 Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/34096 Exploit Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2009/0703 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/49212 Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/8241 Exploit Third Party Advisory VDB Entry
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00487.html Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00529.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html Not Applicable
http://secunia.com/advisories/34256 Third Party Advisory
http://secunia.com/advisories/34311 Third Party Advisory
http://secunia.com/advisories/35687 Third Party Advisory
http://security.gentoo.org/glsa/glsa-200907-02.xml Third Party Advisory
http://sourceforge.net/project/shownotes.php?release_id=667542&group_id=68846 Third Party Advisory
http://www.osvdb.org/52553 Broken Link
http://www.securityfocus.com/archive/1/501968 Exploit Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/34096 Exploit Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2009/0703 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/49212 Third Party Advisory VDB Entry
https://www.exploit-db.com/exploits/8241 Exploit Third Party Advisory VDB Entry
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00487.html Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00529.html Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:9:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*

History

21 Nov 2024, 01:03

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html - Not Applicable () http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html - Not Applicable
References () http://secunia.com/advisories/34256 - Third Party Advisory () http://secunia.com/advisories/34256 - Third Party Advisory
References () http://secunia.com/advisories/34311 - Third Party Advisory () http://secunia.com/advisories/34311 - Third Party Advisory
References () http://secunia.com/advisories/35687 - Third Party Advisory () http://secunia.com/advisories/35687 - Third Party Advisory
References () http://security.gentoo.org/glsa/glsa-200907-02.xml - Third Party Advisory () http://security.gentoo.org/glsa/glsa-200907-02.xml - Third Party Advisory
References () http://sourceforge.net/project/shownotes.php?release_id=667542&group_id=68846 - Third Party Advisory () http://sourceforge.net/project/shownotes.php?release_id=667542&group_id=68846 - Third Party Advisory
References () http://www.osvdb.org/52553 - Broken Link () http://www.osvdb.org/52553 - Broken Link
References () http://www.securityfocus.com/archive/1/501968 - Exploit, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/501968 - Exploit, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/34096 - Exploit, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/34096 - Exploit, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2009/0703 - Third Party Advisory () http://www.vupen.com/english/advisories/2009/0703 - Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/49212 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/49212 - Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/8241 - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/8241 - Exploit, Third Party Advisory, VDB Entry
References () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00487.html - Third Party Advisory () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00487.html - Third Party Advisory
References () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00529.html - Third Party Advisory () https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00529.html - Third Party Advisory

Information

Published : 2009-06-03 17:00

Updated : 2024-11-21 01:03


NVD link : CVE-2009-1902

Mitre link : CVE-2009-1902

CVE.ORG link : CVE-2009-1902


JSON object : View

Products Affected

fedoraproject

  • fedora

trustwave

  • modsecurity
CWE
CWE-476

NULL Pointer Dereference