MGASA-2014-0304

Source
https://advisories.mageia.org/MGASA-2014-0304.html
Import Source
https://advisories.mageia.org/MGASA-2014-0304.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0304
Related
Published
2014-07-29T21:30:55Z
Modified
2014-07-29T21:28:15Z
Summary
Updated apache package fixes security vulnerabilities
Details

A race condition flaw, leading to heap-based buffer overflows, was found in the modstatus httpd module. A remote attacker able to access a status page served by modstatus on a server using a threaded Multi-Processing Module (MPM) could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the "apache" user (CVE-2014-0226).

A denial of service flaw was found in the way httpd's mod_deflate module handled request body decompression (configured via the "DEFLATE" input filter). A remote attacker able to send a request whose body would be decompressed could use this flaw to consume an excessive amount of system memory and CPU on the target system (CVE-2014-0118).

A denial of service flaw was found in the way httpd's mod_cgid module executed CGI scripts that did not read data from the standard input. A remote attacker could submit a specially crafted request that would cause the httpd child process to hang indefinitely (CVE-2014-0231).

References
Credits

Affected packages

Mageia:3 / apache

Package

Name
apache
Purl
pkg:rpm/mageia/apache?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.4-7.8.mga3

Ecosystem specific

{
    "section": "core"
}