MGASA-2014-0305

Source
https://advisories.mageia.org/MGASA-2014-0305.html
Import Source
https://advisories.mageia.org/MGASA-2014-0305.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2014-0305
Related
Published
2014-07-29T21:30:55Z
Modified
2022-01-22T02:45:17Z
Summary
Updated apache package fixes security vulnerabilities
Details

A race condition flaw, leading to heap-based buffer overflows, was found in the modstatus httpd module. A remote attacker able to access a status page served by modstatus on a server using a threaded Multi-Processing Module (MPM) could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the "apache" user (CVE-2014-0226).

A denial of service flaw was found in the mod_proxy httpd module. A remote attacker could send a specially crafted request to a server configured as a reverse proxy using a threaded Multi-Processing Modules (MPM) that would cause the httpd child process to crash (CVE-2014-0117).

A denial of service flaw was found in the way httpd's mod_deflate module handled request body decompression (configured via the "DEFLATE" input filter). A remote attacker able to send a request whose body would be decompressed could use this flaw to consume an excessive amount of system memory and CPU on the target system (CVE-2014-0118).

A denial of service flaw was found in the way httpd's mod_cgid module executed CGI scripts that did not read data from the standard input. A remote attacker could submit a specially crafted request that would cause the httpd child process to hang indefinitely (CVE-2014-0231).

References
Credits

Affected packages

Mageia:4 / apache

Package

Name
apache
Purl
pkg:rpm/mageia/apache?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.7-5.3.mga4

Ecosystem specific

{
    "section": "core"
}