HIGH · 7.2

CVE-2019-10097

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buff...

Vulnerability Description

In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.

CVSS Score

7.2

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
ApacheHttp Server2.4.33
OracleCommunications Element Manager8.0.0
OracleCommunications Session Report Manager8.1.1
OracleCommunications Session Route Manager8.1.1
OracleEnterprise Manager Ops Center12.3.3
OracleHttp Server12.2.1.4.0
OracleInstantis Enterprisetrack>= 17.1, <= 17.3
OracleRetail Xstore Point Of Service7.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-10097?

CVE-2019-10097 is a vulnerability with a CVSS score of 7.2 (HIGH). In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buff...

How severe is CVE-2019-10097?

CVE-2019-10097 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-10097?

Check the references section above for vendor advisories and patch information. Affected products include: Apache Http Server, Oracle Communications Element Manager, Oracle Communications Session Report Manager, Oracle Communications Session Route Manager, Oracle Enterprise Manager Ops Center.