First published: Tue Mar 18 2014(Updated: )
The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP Server | >=2.2.0<2.2.27 | |
Apache HTTP Server | >=2.4.1<2.4.9 | |
Oracle HTTP Server | =10.1.3.5.0 | |
Oracle HTTP Server | =11.1.1.7.0 | |
Oracle HTTP Server | =12.1.2.0 | |
Oracle HTTP Server | =12.1.3.0 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6438 is classified as a high severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2013-6438, upgrade to Apache HTTP Server version 2.4.8 or later.
CVE-2013-6438 affects Apache HTTP Server versions before 2.4.8 and specific versions of Oracle and Ubuntu HTTP Server.
Yes, CVE-2013-6438 can be exploited by remote attackers through crafted DAV WRITE requests.
CVE-2013-6438 can lead to a denial of service, resulting in a crash of the Apache server.