UBUNTU-CVE-2019-19886

Source
https://ubuntu.com/security/CVE-2019-19886
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-19886.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2019-19886
Related
Published
2020-01-21T22:15:00Z
Modified
2020-01-21T22:15:00Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Trustwave ModSecurity 3.0.0 through 3.0.3 allows an attacker to send crafted requests that may, when sent quickly in large volumes, lead to the server becoming slow or unresponsive (Denial of Service) because of a flaw in Transaction::addRequestHeader in transaction.cc.

References

Affected packages

Ubuntu:20.04:LTS / modsecurity

Package

Name
modsecurity
Purl
pkg:deb/ubuntu/modsecurity?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.0.4-1

Affected versions

3.*

3.0.3-1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "untriaged",
    "binaries": [
        {
            "binary_version": "3.0.4-1",
            "binary_name": "libmodsecurity-dev"
        },
        {
            "binary_version": "3.0.4-1",
            "binary_name": "libmodsecurity3"
        },
        {
            "binary_version": "3.0.4-1",
            "binary_name": "libmodsecurity3-dbgsym"
        }
    ]
}