First published: Thu Jul 17 2014(Updated: )
The following flaw has been fixed in the Apache HTTP Server: "A flaw was found in mod_proxy. A remote attacker could send a carefully crafted request to a server configured as a reverse proxy, and cause the child process to crash. This could lead to a denial of service against a threaded MPM." External References: <a href="http://httpd.apache.org/security/vulnerabilities_24.html">http://httpd.apache.org/security/vulnerabilities_24.html</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.4.10 | 2.4.10 |
Apache Http Server | =2.4.6 | |
Apache Http Server | =2.4.7 | |
Apache Http Server | =2.4.8 | |
Apache Http Server | =2.4.9 | |
Apple iOS and macOS | <=10.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0117 has been classified as a high-severity vulnerability due to its potential to cause denial of service.
CVE-2014-0117 allows a remote attacker to send a crafted request to a reverse proxy, leading to a crash of the child process.
To fix CVE-2014-0117, upgrade your Apache HTTP Server to version 2.4.10 or later.
CVE-2014-0117 affects Apache HTTP Server versions 2.4.6 through 2.4.9.
Yes, macOS Yosemite is affected if it is running an older version of Apache HTTP Server up to 10.10.2.