[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256040

 
 

909

 
 

199103

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2014-389 ---- httpd24, mod24_session

ID: oval:org.secpod.oval:def:1600001Date: (C)2016-01-19   (M)2024-02-19
Class: PATCHFamily: unix




A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the "apache" user. A denial of service flaw was found in the way httpd"s mod_deflate module handled request body decompression . A remote attacker able to send a request whose body would be decompressed could use this flaw to consume an excessive amount of system memory and CPU on the target system. A denial of service flaw was found in the way httpd"s mod_cgid module executed CGI scripts that did not read data from the standard input. A remote attacker could submit a specially crafted request that would cause the httpd child process to hang indefinitely

Platform:
Amazon Linux AMI
Product:
httpd24
mod24_session
Reference:
ALAS-2014-389
CVE-2014-0118
CVE-2014-0226
CVE-2014-0231
CVE    3
CVE-2014-0118
CVE-2014-0231
CVE-2014-0226
CPE    2
cpe:/o:amazon:linux
cpe:/a:apache:httpd24

© SecPod Technologies