Vulnerability CVE-2014-0117


Published: 2014-07-20

Description:
The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Apache 2.4.x mod_proxy Denial Of Service
Marek Kroemeke
23.07.2014

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:N/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
None
Partial
Affected software
Apple -> Mac os x 
Apache -> Http server 

 References:
http://advisories.mageia.org/MGASA-2014-0305.html
http://httpd.apache.org/security/vulnerabilities_24.html
http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
http://seclists.org/fulldisclosure/2014/Jul/117
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1599486&r2=1610674&diff_format=h
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c?r1=1609680&r2=1610674&diff_format=h
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
http://zerodayinitiative.com/advisories/ZDI-14-239/
https://bugzilla.redhat.com/show_bug.cgi?id=1120599
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://support.apple.com/HT204659

Copyright 2024, cxsecurity.com

 

Back to Top