MEDIUM · 6.8

CVE-2014-0226

Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credenti...

Vulnerability Description

Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.

CVSS Score

6.8

MEDIUM

AV:N/AC:M/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
ApacheHttp Server>= 2.2.0, < 2.2.29
DebianDebian Linux7.0
RedhatJboss Enterprise Application Platform6.0.0
RedhatEnterprise Linux5.0
OracleEnterprise Manager Ops Center11.1.3
OracleHttp Server10.1.3.5.0
OracleSecure Global Desktop4.63

Related Weaknesses (CWE)

References

FAQ

What is CVE-2014-0226?

CVE-2014-0226 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credenti...

How severe is CVE-2014-0226?

CVE-2014-0226 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2014-0226?

Check the references section above for vendor advisories and patch information. Affected products include: Apache Http Server, Debian Debian Linux, Redhat Jboss Enterprise Application Platform, Redhat Enterprise Linux, Oracle Enterprise Manager Ops Center.