CVE-2014-0226

Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
Race Condition
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
VendorProductVersion
apachehttp_server
2.2.0 ≤
𝑥
< 2.2.29
apachehttp_server
2.4.1 ≤
𝑥
< 2.4.10
debiandebian_linux
7.0
debiandebian_linux
8.0
redhatjboss_enterprise_application_platform
6.0.0
redhatjboss_enterprise_application_platform
6.4.0
oracleenterprise_manager_ops_center
11.1.3
oracleenterprise_manager_ops_center
12.1.4
oraclehttp_server
10.1.3.5.0
oraclehttp_server
11.1.1.7.0
oraclehttp_server
12.1.2.0
oraclehttp_server
12.1.3.0
oraclesecure_global_desktop
4.63
oraclesecure_global_desktop
4.71
oraclesecure_global_desktop
5.0
oraclesecure_global_desktop
5.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
apache2
bullseye
2.4.62-1~deb11u1
fixed
bullseye (security)
2.4.62-1~deb11u2
fixed
bookworm
2.4.62-1~deb12u1
fixed
bookworm (security)
2.4.62-1~deb12u2
fixed
sid
2.4.62-3
fixed
trixie
2.4.62-3
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
apache2
trusty
Fixed 2.4.7-1ubuntu4.1
released
precise
Fixed 2.2.22-1ubuntu1.7
released
lucid
Fixed 2.2.14-5ubuntu8.14
released
References