Description
Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
Published: 2014-07-20
Score: 6.8 Medium
EPSS: 75.4% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-66-1 apache2 security update
Debian DSA Debian DSA DSA-2989-1 apache2 security update
Ubuntu USN Ubuntu USN USN-2299-1 Apache HTTP Server vulnerabilities
References
Link Providers
http://advisories.mageia.org/MGASA-2014-0304.html cve-icon cve-icon
http://advisories.mageia.org/MGASA-2014-0305.html cve-icon cve-icon
http://httpd.apache.org/security/vulnerabilities_24.html cve-icon cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=143403519711434&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=143748090628601&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=144050155601375&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=144493176821532&w=2 cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2014-1019.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2014-1020.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2014-1021.html cve-icon cve-icon
http://seclists.org/fulldisclosure/2014/Jul/114 cve-icon cve-icon
http://secunia.com/advisories/60536 cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-201408-12.xml cve-icon cve-icon
http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES cve-icon cve-icon
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_status.c cve-icon cve-icon
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_status.c?r1=1450998&r2=1610491&diff_format=h cve-icon cve-icon
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/lua/lua_request.c cve-icon cve-icon
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/lua/lua_request.c?r1=1588989&r2=1610491&diff_format=h cve-icon cve-icon
http://www.debian.org/security/2014/dsa-2989 cve-icon cve-icon
http://www.exploit-db.com/exploits/34133 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2014:142 cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html cve-icon cve-icon
http://www.osvdb.org/109216 cve-icon cve-icon
http://www.securityfocus.com/bid/68678 cve-icon cve-icon
http://zerodayinitiative.com/advisories/ZDI-14-236/ cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=1120603 cve-icon cve-icon
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246 cve-icon cve-icon
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rd336919f655b7ff309385e34a143e41c503e133da80414485b3abcc9%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2014-0226 cve-icon
https://puppet.com/security/cve/cve-2014-0226 cve-icon cve-icon
https://security.gentoo.org/glsa/201504-03 cve-icon cve-icon
https://support.apple.com/HT204659 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2014-0226 cve-icon
https://www.povonsec.com/apache-2-4-7-exploit/ cve-icon cve-icon
History

No history.

Subscriptions

Apache Http Server
Debian Debian Linux
Oracle Enterprise Manager Ops Center Http Server Secure Global Desktop
Redhat Enterprise Linux Jboss Enterprise Application Platform Jboss Enterprise Web Server Rhel Software Collections
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T09:05:39.328Z

Reserved: 2013-12-03T00:00:00.000Z

Link: CVE-2014-0226

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-07-20T11:12:48.933

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-0226

cve-icon Redhat

Severity : Important

Publid Date: 2014-07-17T00:00:00Z

Links: CVE-2014-0226 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses