First published: Tue Mar 18 2014(Updated: )
The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP Server | >=2.2.0<2.2.27 | |
Apache HTTP Server | >=2.4.1<2.4.9 | |
Oracle HTTP Server | =10.1.3.5.0 | |
Oracle HTTP Server | =11.1.1.7.0 | |
Oracle HTTP Server | =12.1.2.0 | |
Oracle HTTP Server | =12.1.3.0 | |
Tarantella Secure Global Desktop | =4.63 | |
Tarantella Secure Global Desktop | =4.71 | |
Tarantella Secure Global Desktop | =5.0 | |
Tarantella Secure Global Desktop | =5.1 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =12.10 | |
Ubuntu | =13.10 | |
Apache Http Server | >=2.2.0<2.2.27 | |
Apache Http Server | >=2.4.1<2.4.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0098 is classified as a medium severity vulnerability that can lead to denial of service.
To fix CVE-2014-0098, upgrade Apache HTTP Server to version 2.4.8 or later.
CVE-2014-0098 can cause a segmentation fault and crash the Apache HTTP Server when a malformed cookie is processed.
CVE-2014-0098 affects Apache HTTP Server versions prior to 2.4.8 and versions 2.2.0 to 2.2.27.
Any configuration of Apache HTTP Server that processes cookies is at risk from CVE-2014-0098.