First published: Thu Jul 17 2014(Updated: )
The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.4.10 | 2.4.10 |
Apache HTTP Server | >=2.2.0<2.2.29 | |
Apache HTTP Server | >=2.4.1<2.4.10 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
redhat jboss enterprise application platform | =6.0.0 | |
redhat jboss enterprise application platform | =6.4.0 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0118 has a severity rating indicating a denial of service risk due to excessive resource consumption.
To fix CVE-2014-0118, upgrade your Apache HTTP Server to version 2.4.10 or later.
CVE-2014-0118 affects Apache HTTP Server versions prior to 2.4.10 and those between 2.2.0 and 2.2.29.
Yes, CVE-2014-0118 can be exploited remotely through crafted request data if request body decompression is enabled.
The potential impacts of CVE-2014-0118 include denial of service, as attackers can consume excessive server resources.