Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
UBUNTU-CVE-2023-38285
See a problem?
Please try reporting it
to the source
first.
Source
https://ubuntu.com/security/CVE-2023-38285
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-38285.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2023-38285
Upstream
CVE-2023-38285
Published
2023-07-26T21:15:00Z
Modified
2025-07-18T16:54:33Z
Severity
7.5 (High)
CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS Calculator
Ubuntu - medium
Summary
[none]
Details
Trustwave ModSecurity 3.x before 3.0.10 has Inefficient Algorithmic Complexity.
References
https://ubuntu.com/security/CVE-2023-38285
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/modsecurity-v3-dos-vulnerability-in-four-transformations-cve-2023-38285/
https://www.trustwave.com/en-us/resources/security-resources/software-updates/end-of-sale-and-trustwave-support-for-modsecurity-web-application-firewall/
https://www.cve.org/CVERecord?id=CVE-2023-38285
Affected packages
Ubuntu:Pro:20.04:LTS
/
modsecurity
Package
Name
modsecurity
Purl
pkg:deb/ubuntu/modsecurity@3.0.4-1build1?arch=source&distro=esm-apps/focal
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Affected versions
3.*
3.0.3-1
3.0.4-1
3.0.4-1build1
Ubuntu:22.04:LTS
/
modsecurity
Package
Name
modsecurity
Purl
pkg:deb/ubuntu/modsecurity@3.0.6-1?arch=source&distro=jammy
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Affected versions
3.*
3.0.4-2
3.0.6-1
Ubuntu:24.04:LTS
/
modsecurity
Package
Name
modsecurity
Purl
pkg:deb/ubuntu/modsecurity@3.0.12-1.1build2?arch=source&distro=noble
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Affected versions
3.*
3.0.10-1
3.0.11-1
3.0.12-1
3.0.12-1.1build1
3.0.12-1.1build2
UBUNTU-CVE-2023-38285 - OSV