Vulnerability Description
In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buffer overflow or NULL pointer deference. This vulnerability could only be triggered by a trusted proxy and not by untrusted HTTP clients.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Http Server | 2.4.33 |
| Oracle | Communications Element Manager | 8.0.0 |
| Oracle | Communications Session Report Manager | 8.1.1 |
| Oracle | Communications Session Route Manager | 8.1.1 |
| Oracle | Enterprise Manager Ops Center | 12.3.3 |
| Oracle | Http Server | 12.2.1.4.0 |
| Oracle | Instantis Enterprisetrack | >= 17.1, <= 17.3 |
| Oracle | Retail Xstore Point Of Service | 7.1 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2019:4126Third Party Advisory
- https://httpd.apache.org/security/vulnerabilities_24.htmlVendor Advisory
- https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f60
- https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda
- https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46
- https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37
- https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f8
- https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa
- https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0
- https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbc
- https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da8
- https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cac
- https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90b
- https://www.oracle.com/security-alerts/cpuapr2020.htmlThird Party Advisory
- https://www.oracle.com/security-alerts/cpujul2020.htmlThird Party Advisory
FAQ
What is CVE-2019-10097?
CVE-2019-10097 is a vulnerability with a CVSS score of 7.2 (HIGH). In Apache HTTP Server 2.4.32-2.4.39, when mod_remoteip was configured to use a trusted intermediary proxy server using the "PROXY" protocol, a specially crafted PROXY header could trigger a stack buff...
How severe is CVE-2019-10097?
CVE-2019-10097 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-10097?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Http Server, Oracle Communications Element Manager, Oracle Communications Session Report Manager, Oracle Communications Session Route Manager, Oracle Enterprise Manager Ops Center.