Mandriva Linux Security Advisory 2009-183 – Multiple unspecified vulnerabilities in the ModSecurity (aka mod_security) module 2.5.0 through 2.5.5 for the Apache HTTP Server, when SecCacheTransformations is enabled, allow remote attackers to cause a denial of service (daemon crash) or bypass the product’s functionality via unknown vectors related to transformation caching. The multipart processor in ModSecurity before 2.5.9 allows remote attackers to cause a denial of service (crash) via a multipart form datapost request with a missing part header name, which triggers a NULL pointer dereference. The PDF XSS protection feature in ModSecurity before 2.5.8 allows remote attackers to cause a denial of service (Apache httpd crash) via a request for a PDF file that does not use the GET method. This update provides mod_security 2.5.9, which is not vulnerable to these issues.
You can download this advisory from the following link: https://packetstormsecurity.com/files/download/79948/MDVSA-2009-183.txt
Source: https://packetstormsecurity.com/files/79948/Mandriva-Linux-Security-Advisory-2009-183.html

