6.8

CVE-2014-0226

Exploit

Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.

Data is provided by the National Vulnerability Database (NVD)
ApacheHTTP Server Version >= 2.2.0 < 2.2.29
ApacheHTTP Server Version >= 2.4.1 < 2.4.10
DebianDebian Linux Version7.0
DebianDebian Linux Version8.0
RedhatJboss Enterprise Application Platform Version6.0.0
   RedhatEnterprise Linux Version5.0
   RedhatEnterprise Linux Version6.0
RedhatJboss Enterprise Application Platform Version6.4.0
   RedhatEnterprise Linux Version5.0
   RedhatEnterprise Linux Version6.0
OracleHTTP Server Version10.1.3.5.0
OracleHTTP Server Version11.1.1.7.0
OracleHTTP Server Version12.1.2.0
OracleHTTP Server Version12.1.3.0
OracleSecure Global Desktop Version4.63
OracleSecure Global Desktop Version4.71
OracleSecure Global Desktop Version5.0
OracleSecure Global Desktop Version5.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 73.42% 0.987
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.

http://marc.info/?l=bugtraq&m=144050155601375&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://marc.info/?l=bugtraq&m=143403519711434&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://marc.info/?l=bugtraq&m=144493176821532&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://marc.info/?l=bugtraq&m=143748090628601&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://seclists.org/fulldisclosure/2014/Jul/114
Third Party Advisory
Exploit
Mailing List
http://www.exploit-db.com/exploits/34133
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/68678
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1120603
Third Party Advisory
Issue Tracking