Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2014-07-20 11:12
Updated : 2023-11-07 02:18
NVD link : CVE-2014-0226
Mitre link : CVE-2014-0226
CVE.ORG link : CVE-2014-0226
JSON object : View
Products Affected
redhat
- jboss_enterprise_application_platform
- enterprise_linux
apache
- http_server
oracle
- enterprise_manager_ops_center
- http_server
- secure_global_desktop
debian
- debian_linux
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')