Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2014-0226


Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.


Published

2014-07-20T11:12:48.933

Last Modified

2025-04-12T10:46:40.837

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 6.8 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-362

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application apache http_server < 2.2.29 Yes
Application apache http_server < 2.4.10 Yes
Operating System debian debian_linux 7.0 Yes
Operating System debian debian_linux 8.0 Yes
Application redhat jboss_enterprise_application_platform 6.0.0 Yes
Application redhat jboss_enterprise_application_platform 6.4.0 Yes
Operating System redhat enterprise_linux 5.0 No
Operating System redhat enterprise_linux 6.0 No
Application oracle enterprise_manager_ops_center 11.1.3 Yes
Application oracle enterprise_manager_ops_center 12.1.4 Yes
Application oracle http_server 10.1.3.5.0 Yes
Application oracle http_server 11.1.1.7.0 Yes
Application oracle http_server 12.1.2.0 Yes
Application oracle http_server 12.1.3.0 Yes
Application oracle secure_global_desktop 4.63 Yes
Application oracle secure_global_desktop 4.71 Yes
Application oracle secure_global_desktop 5.0 Yes
Application oracle secure_global_desktop 5.1 Yes

References