CVE-2024-46292

A buffer overflow in modsecurity v3.0.12 allows attackers to cause a Denial of Service (DoS) via a crafted input inserted into the name parameter. NOTE: this is disputed by the Supplier because it cannot be reproduced. Also, the product's documentation indicates that it is not guaranteed to be usable with very large values of SecRequestBodyNoFilesLimit (which are required by the claimed issue).
Configurations

Configuration 1 (hide)

cpe:2.3:a:trustwave:modsecurity:3.0.12:*:*:*:*:*:*:*

History

No history.

Information

Published : 2024-10-09 16:15

Updated : 2025-06-17 15:49


NVD link : CVE-2024-46292

Mitre link : CVE-2024-46292

CVE.ORG link : CVE-2024-46292


JSON object : View

Products Affected

trustwave

  • modsecurity
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')