A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. NOTE: this is disputed by the Supplier because it cannot be reproduced. Also, the product's documentation indicates that it is not guaranteed to be usable with very large values of SecRequestBodyNoFilesLimit (which are required by the claimed issue).
Metrics
Affected Vendors & Products
References
History
Mon, 21 Oct 2024 00:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. | A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. NOTE: this is disputed by the Supplier because it cannot be reproduced. Also, the product's documentation indicates that it is not guaranteed to be usable with very large values of SecRequestBodyNoFilesLimit (which are required by the claimed issue). |
References |
|
Thu, 10 Oct 2024 02:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | mod_security: denial of service via name paramter | |
Weaknesses | CWE-400 | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Wed, 09 Oct 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Modsecurity
Modsecurity modsecurity |
|
Weaknesses | CWE-120 | |
CPEs | cpe:2.3:a:modsecurity:modsecurity:3.0.12:*:*:*:*:*:*:* | |
Vendors & Products |
Modsecurity
Modsecurity modsecurity |
|
Metrics |
cvssV3_1
|
Wed, 09 Oct 2024 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2024-10-09T00:00:00
Updated: 2024-10-20T23:47:38.210427
Reserved: 2024-09-11T00:00:00
Link: CVE-2024-46292
Vulnrichment
Updated: 2024-10-09T16:33:10.372Z
NVD
Status : Awaiting Analysis
Published: 2024-10-09T16:15:04.373
Modified: 2024-10-21T00:15:12.240
Link: CVE-2024-46292
Redhat