First published: Sun Mar 08 2015(Updated: )
The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server | <=2.4.12 | |
Ubuntu | =10.04 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =14.10 | |
Apple iOS and macOS | =10.10.4 | |
Apple macOS Server | =5.0.3 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0228 has been classified as a medium severity vulnerability.
To fix CVE-2015-0228, upgrade to Apache HTTP Server version 2.4.13 or later.
CVE-2015-0228 affects the mod_lua module in the Apache HTTP Server up to version 2.4.12.
CVE-2015-0228 allows remote attackers to trigger a denial of service condition by causing a child-process crash.
CVE-2015-0228 impacts various distributions including Ubuntu, macOS, and openSUSE that use affected versions of Apache.