[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2014-388 ---- httpd

ID: oval:org.secpod.oval:def:1600109Date: (C)2016-01-19   (M)2024-02-19
Class: PATCHFamily: unix




A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the "apache" user. A denial of service flaw was found in the way httpd"s mod_deflate module handled request body decompression . A remote attacker able to send a request whose body would be decompressed could use this flaw to consume an excessive amount of system memory and CPU on the target system. A denial of service flaw was found in the way httpd"s mod_cgid module executed CGI scripts that did not read data from the standard input. A remote attacker could submit a specially crafted request that would cause the httpd child process to hang indefinitely

Platform:
Amazon Linux AMI
Product:
httpd
Reference:
ALAS-2014-388
CVE-2014-0118
CVE-2014-0226
CVE-2014-0231
CVE    3
CVE-2014-0118
CVE-2014-0231
CVE-2014-0226
CPE    35
cpe:/o:amazon:linux
cpe:/a:apache:http_server:2.2.26
cpe:/a:apache:http_server:2.2.27
cpe:/a:apache:http_server:2.2.24
...

© SecPod Technologies