First published: Thu Jul 17 2014(Updated: )
Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.4.10 | 2.4.10 |
Apache HTTP Server | >=2.2.0<2.2.29 | |
Apache HTTP Server | >=2.4.1<2.4.10 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
redhat jboss enterprise application platform | =6.0.0 | |
redhat jboss enterprise application platform | =6.4.0 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =6.0 | |
Oracle Enterprise Manager Ops Center | =11.1.3 | |
Oracle Enterprise Manager Ops Center | =12.1.4 | |
Oracle HTTP Server | =10.1.3.5.0 | |
Oracle HTTP Server | =11.1.1.7.0 | |
Oracle HTTP Server | =12.1.2.0 | |
Oracle HTTP Server | =12.1.3.0 | |
Oracle Secure Global Desktop | =4.63 | |
Oracle Secure Global Desktop | =4.71 | |
Oracle Secure Global Desktop | =5.0 | |
Oracle Secure Global Desktop | =5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0226 is considered a high-severity vulnerability that can lead to denial of service and potential remote code execution.
To fix CVE-2014-0226, upgrade your Apache HTTP Server to version 2.4.10 or later.
CVE-2014-0226 affects Apache HTTP Server versions prior to 2.4.10 and versions 2.2.0 to 2.2.29.
Yes, CVE-2014-0226 may allow remote attackers to obtain sensitive credential information.
Yes, CVE-2014-0226 has been recognized as a significant risk in enterprise environments using vulnerable versions of Apache HTTP Server.