Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2014-0117
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 4.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- Partial
- Integrity Impact
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:http_server:2.4.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c
- http://zerodayinitiative.com/advisories/ZDI-14-239/
- http://httpd.apache.org/security/vulnerabilities_24.html
- http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c
- http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1599486
- http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/proxy_util.c?r1=1609680&r2=
- https://bugzilla.redhat.com/show_bug.cgi?id=1120599
- http://seclists.org/fulldisclosure/2014/Jul/117
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://advisories.mageia.org/MGASA-2014-0305.html
- https://support.apple.com/HT204659
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65
- https://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e1004502092
- https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582
- https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d
- https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4
- https://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3
- https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464
- https://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d70
- https://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2b
- https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708
- https://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be
- https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfc