First published: Mon Jul 20 2015(Updated: )
The read_request_line function in server/protocol.c in the Apache HTTP Server 2.4.12 does not initialize the protocol structure member, which allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) by sending a request that lacks a method to an installation that enables the INCLUDES filter and has an ErrorDocument 400 directive specifying a local URI.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP server | =2.4.12 | |
Apple Mac OS X | =10.10.4 | |
Apple Mac OS X Server | =5.0.3 | |
Oracle Linux | =7 | |
Oracle Solaris | =11.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.