Improper Resource Shutdown or Release Affecting modsecurity package, versions <3.0.4-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.41% (74th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN13-MODSECURITY-5689402
  • published21 Jan 2020
  • disclosed21 Jan 2020

Introduced: 21 Jan 2020

CVE-2019-19886  (opens in a new tab)
CWE-404  (opens in a new tab)

How to fix?

Upgrade Debian:13 modsecurity to version 3.0.4-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream modsecurity package and not the modsecurity package as distributed by Debian. See How to fix? for Debian:13 relevant fixed versions and status.

Trustwave ModSecurity 3.0.0 through 3.0.3 allows an attacker to send crafted requests that may, when sent quickly in large volumes, lead to the server becoming slow or unresponsive (Denial of Service) because of a flaw in Transaction::addRequestHeader in transaction.cc.

CVSS Scores

version 3.1