CVE-2014-0226

Priority
Medium
Description
Race condition in the mod_status module in the Apache HTTP Server before
2.4.10 allows remote attackers to cause a denial of service (heap-based
buffer overflow), or possibly obtain sensitive credential information or
execute arbitrary code, via a crafted request that triggers improper
scoreboard handling within the status_handler function in
modules/generators/mod_status.c and the lua_ap_scoreboard_worker function
in modules/lua/lua_request.c.
References
Notes
mdeslaur> PoC: http://seclists.org/fulldisclosure/2014/Jul/114
Assigned-to
mdeslaur
Package
Upstream:released (2.4.10)
Ubuntu 10.04 LTS (Lucid Lynx):released (2.2.14-5ubuntu8.14)
Ubuntu 12.04 LTS (Precise Pangolin):released (2.2.22-1ubuntu1.7)
Ubuntu 14.04 LTS (Trusty Tahr):released (2.4.7-1ubuntu4.1)
Ubuntu 14.10 (Utopic Unicorn):released (2.4.10-1ubuntu1)
Patches:
Upstream:http://svn.apache.org/viewvc?view=revision&revision=1610499 (2.4.x)
Upstream:http://svn.apache.org/viewvc?view=revision&revision=1610515 (2.2.x)
More Information

Valid XHTML 1.0 Strict

Updated: 2014-07-25 13:14:28 UTC (commit 8280)