A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. NOTE: this is disputed by the Supplier because it cannot be reproduced. Also, the product's documentation indicates that it is not guaranteed to be usable with very large values of SecRequestBodyNoFilesLimit (which are required by the claimed issue).
History

Mon, 21 Oct 2024 00:00:00 +0000

Type Values Removed Values Added
Description A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. NOTE: this is disputed by the Supplier because it cannot be reproduced. Also, the product's documentation indicates that it is not guaranteed to be usable with very large values of SecRequestBodyNoFilesLimit (which are required by the claimed issue).
References

Thu, 10 Oct 2024 02:00:00 +0000

Type Values Removed Values Added
Title mod_security: denial of service via name paramter
Weaknesses CWE-400
References
Metrics threat_severity

None

threat_severity

Low


Wed, 09 Oct 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Modsecurity
Modsecurity modsecurity
Weaknesses CWE-120
CPEs cpe:2.3:a:modsecurity:modsecurity:3.0.12:*:*:*:*:*:*:*
Vendors & Products Modsecurity
Modsecurity modsecurity
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 09 Oct 2024 16:00:00 +0000

Type Values Removed Values Added
Description A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-10-09T00:00:00

Updated: 2024-10-20T23:47:38.210427

Reserved: 2024-09-11T00:00:00

Link: CVE-2024-46292

cve-icon Vulnrichment

Updated: 2024-10-09T16:33:10.372Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-09T16:15:04.373

Modified: 2024-10-21T00:15:12.240

Link: CVE-2024-46292

cve-icon Redhat

Severity : Low

Publid Date: 2024-10-09T00:00:00Z

Links: CVE-2024-46292 - Bugzilla