Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2014-0231 | First vendor Publication | 2014-07-20 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-399 | Resource Management Errors |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:25253 | |||
Oval ID: | oval:org.mitre.oval:def:25253 | ||
Title: | RHSA-2014:0921: httpd security update (Important) | ||
Description: | The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module (MPM) could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the "apache" user. (CVE-2014-0226) A NULL pointer dereference flaw was found in the mod_cache httpd module. A malicious HTTP server could cause the httpd child process to crash when the Apache HTTP Server was used as a forward proxy with caching. (CVE-2013-4352) A denial of service flaw was found in the mod_proxy httpd module. A remote attacker could send a specially crafted request to a server configured as a reverse proxy using a threaded Multi-Processing Modules (MPM) that would cause the httpd child process to crash. (CVE-2014-0117) A denial of service flaw was found in the way httpd's mod_deflate module handled request body decompression (configured via the "DEFLATE" input filter). A remote attacker able to send a request whose body would be decompressed could use this flaw to consume an excessive amount of system memory and CPU on the target system. (CVE-2014-0118) A denial of service flaw was found in the way httpd's mod_cgid module executed CGI scripts that did not read data from the standard input. A remote attacker could submit a specially crafted request that would cause the httpd child process to hang indefinitely. (CVE-2014-0231) All httpd users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the httpd daemon will be restarted automatically. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:0921-00 CESA-2014:0921 CVE-2013-4352 CVE-2014-0117 CVE-2014-0118 CVE-2014-0226 CVE-2014-0231 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 7 CentOS Linux 7 | Product(s): | httpd |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25379 | |||
Oval ID: | oval:org.mitre.oval:def:25379 | ||
Title: | RHSA-2014:0920: httpd security update (Important) | ||
Description: | The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server. A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module (MPM) could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the "apache" user. (CVE-2014-0226) A denial of service flaw was found in the way httpd's mod_deflate module handled request body decompression (configured via the "DEFLATE" input filter). A remote attacker able to send a request whose body would be decompressed could use this flaw to consume an excessive amount of system memory and CPU on the target system. (CVE-2014-0118) A denial of service flaw was found in the way httpd's mod_cgid module executed CGI scripts that did not read data from the standard input. A remote attacker could submit a specially crafted request that would cause the httpd child process to hang indefinitely. (CVE-2014-0231) All httpd users are advised to upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the httpd daemon will be restarted automatically. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2014:0920-00 CESA-2014:0920 CVE-2014-0118 CVE-2014-0226 CVE-2014-0231 | Version: | 3 |
Platform(s): | Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 CentOS Linux 5 CentOS Linux 6 | Product(s): | httpd |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25884 | |||
Oval ID: | oval:org.mitre.oval:def:25884 | ||
Title: | USN-2299-1 -- apache2 vulnerabilities | ||
Description: | Several security issues were fixed in Apache HTTP Server. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-2299-1 CVE-2014-0117 CVE-2014-0118 CVE-2014-0226 CVE-2014-0231 | Version: | 3 |
Platform(s): | Ubuntu 14.04 Ubuntu 12.04 Ubuntu 10.04 | Product(s): | apache2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26259 | |||
Oval ID: | oval:org.mitre.oval:def:26259 | ||
Title: | DSA-2989-1 -- apache2 - security update | ||
Description: | Several security issues were found in the Apache HTTP server. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2989-1 CVE-2014-0118 CVE-2014-0226 CVE-2014-0231 | Version: | 5 |
Platform(s): | Debian GNU/Linux 7 Debian GNU/kFreeBSD 7 | Product(s): | apache2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:26461 | |||
Oval ID: | oval:org.mitre.oval:def:26461 | ||
Title: | SUSE-SU-2014:0967-1 -- Security update for the Apache Web Server | ||
Description: | This update for the Apache Web Server provides several fixes. | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2014:0967-1 CVE-2014-0226 CVE-2013-6438 CVE-2014-0098 CVE-2014-0231 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 | Product(s): | the Apache Web Server |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:27060 | |||
Oval ID: | oval:org.mitre.oval:def:27060 | ||
Title: | ELSA-2014-0920 -- httpd security update (important) | ||
Description: | [2.2.15-31.0.1.el6_5] - replace index.html with Oracle's index page oracle_index.html - update vstring in specfile [2.2.15-31] - mod_cgid: add security fix for CVE-2014-0231 - mod_deflate: add security fix for CVE-2014-0118 - mod_status: add security fix for CVE-2014-0226 | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2014-0920 CVE-2014-0118 CVE-2014-0226 CVE-2014-0231 | Version: | 5 |
Platform(s): | Oracle Linux 5 Oracle Linux 6 | Product(s): | httpd |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-07-16 | IAVM : 2015-A-0149 - Multiple Vulnerabilities in Juniper Networks and Security Manager(NSM) Appliance Severity : Category I - VMSKEY : V0061101 |
2014-11-13 | IAVM : 2014-A-0172 - Multiple Vulnerabilities in Red Hat JBoss Enterprise Application Platform Severity : Category I - VMSKEY : V0057381 |
2014-07-24 | IAVM : 2014-A-0114 - Multiple Vulnerabilities in Apache HTTP Server Severity : Category I - VMSKEY : V0053307 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-07-22 | Name : The remote web server is affected by multiple vulnerabilities. File : hpsmh_7_5.nasl - Type : ACT_GATHER_INFO |
2015-07-20 | Name : The remote host is affected by multiple vulnerabilities. File : juniper_nsm_jsa10685_cred.nasl - Type : ACT_GATHER_INFO |
2015-07-20 | Name : The remote host is affected by multiple vulnerabilities. File : juniper_nsm_jsa10685.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1082-1.nasl - Type : ACT_GATHER_INFO |
2015-04-13 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201504-03.nasl - Type : ACT_GATHER_INFO |
2015-04-10 | Name : The remote host is missing a Mac OS X update that fixes multiple security vul... File : macosx_SecUpd2015-004.nasl - Type : ACT_GATHER_INFO |
2015-04-10 | Name : The remote host is missing a Mac OS X update that fixes multiple security vul... File : macosx_10_10_3.nasl - Type : ACT_GATHER_INFO |
2015-03-30 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2015-093.nasl - Type : ACT_GATHER_INFO |
2015-03-26 | Name : The remote Debian host is missing a security update. File : debian_DLA-66.nasl - Type : ACT_GATHER_INFO |
2015-02-18 | Name : The remote application server is affected by multiple vulnerabilities. File : websphere_8_0_0_10.nasl - Type : ACT_GATHER_INFO |
2015-01-22 | Name : The remote host has a version of Oracle Secure Global Desktop that is affecte... File : oracle_secure_global_desktop_jan_2015_cpu.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_apache_20141014.nasl - Type : ACT_GATHER_INFO |
2015-01-07 | Name : The remote application server is affected by multiple vulnerabilities. File : websphere_8_5_5_4.nasl - Type : ACT_GATHER_INFO |
2014-12-16 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-770.nasl - Type : ACT_GATHER_INFO |
2014-10-21 | Name : The remote application server is affected by multiple vulnerabilities. File : websphere_7_0_0_35.nasl - Type : ACT_GATHER_INFO |
2014-10-12 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2014-389.nasl - Type : ACT_GATHER_INFO |
2014-10-12 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2014-388.nasl - Type : ACT_GATHER_INFO |
2014-09-04 | Name : The remote web server is affected by multiple vulnerabilities. File : apache_2_2_29.nasl - Type : ACT_GATHER_INFO |
2014-08-23 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1088.nasl - Type : ACT_GATHER_INFO |
2014-08-23 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1087.nasl - Type : ACT_GATHER_INFO |
2014-08-21 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-503.nasl - Type : ACT_GATHER_INFO |
2014-08-21 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-502.nasl - Type : ACT_GATHER_INFO |
2014-08-15 | Name : The remote Fedora host is missing a security update. File : fedora_2014-9057.nasl - Type : ACT_GATHER_INFO |
2014-08-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1020.nasl - Type : ACT_GATHER_INFO |
2014-08-08 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-1019.nasl - Type : ACT_GATHER_INFO |
2014-08-07 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-140721.nasl - Type : ACT_GATHER_INFO |
2014-07-31 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2014-142.nasl - Type : ACT_GATHER_INFO |
2014-07-30 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0921.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Fedora host is missing a security update. File : fedora_2014-8742.nasl - Type : ACT_GATHER_INFO |
2014-07-26 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2989.nasl - Type : ACT_GATHER_INFO |
2014-07-25 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_f927e06c110911e4b09020cf30e32f6d.nasl - Type : ACT_GATHER_INFO |
2014-07-24 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-2299-1.nasl - Type : ACT_GATHER_INFO |
2014-07-24 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20140723_httpd_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2014-07-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2014-0920.nasl - Type : ACT_GATHER_INFO |
2014-07-24 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0921.nasl - Type : ACT_GATHER_INFO |
2014-07-24 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2014-0920.nasl - Type : ACT_GATHER_INFO |
2014-07-24 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0921.nasl - Type : ACT_GATHER_INFO |
2014-07-24 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2014-0920.nasl - Type : ACT_GATHER_INFO |
2014-07-24 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2014-204-01.nasl - Type : ACT_GATHER_INFO |
2014-07-21 | Name : The remote web server may be affected by multiple vulnerabilities. File : apache_2_4_10.nasl - Type : ACT_GATHER_INFO |
2014-07-21 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_4364e1f10f4411e4b09020cf30e32f6d.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 12:38:31 |
|
2024-08-02 12:26:36 |
|
2024-08-02 01:07:58 |
|
2024-02-02 01:25:51 |
|
2024-02-01 12:07:41 |
|
2023-11-07 21:45:24 |
|
2023-10-31 21:29:02 |
|
2023-09-05 12:24:29 |
|
2023-09-05 01:07:36 |
|
2023-09-02 12:24:27 |
|
2023-09-02 01:07:41 |
|
2023-08-12 12:26:41 |
|
2023-08-12 01:07:12 |
|
2023-08-11 12:22:35 |
|
2023-08-11 01:07:22 |
|
2023-08-06 12:21:59 |
|
2023-08-06 01:07:11 |
|
2023-08-04 12:22:00 |
|
2023-08-04 01:07:14 |
|
2023-07-14 12:21:58 |
|
2023-07-14 01:07:13 |
|
2023-03-29 01:23:55 |
|
2023-03-28 12:07:34 |
|
2022-10-11 12:19:50 |
|
2022-10-11 01:07:22 |
|
2021-06-25 01:13:08 |
|
2021-06-06 17:23:01 |
|
2021-06-03 13:23:12 |
|
2021-05-05 01:15:10 |
|
2021-05-04 12:31:45 |
|
2021-04-22 01:39:22 |
|
2021-03-30 17:22:49 |
|
2020-10-10 01:10:16 |
|
2020-05-23 01:50:45 |
|
2020-05-23 00:39:24 |
|
2019-08-16 12:02:26 |
|
2019-03-18 12:02:23 |
|
2018-10-31 00:20:35 |
|
2018-09-22 12:05:20 |
|
2018-04-16 01:01:52 |
|
2017-12-09 09:22:20 |
|
2017-09-30 12:01:16 |
|
2017-07-25 12:02:47 |
|
2017-01-07 09:25:17 |
|
2016-12-22 09:23:34 |
|
2016-12-08 09:23:29 |
|
2016-09-30 01:04:37 |
|
2016-08-23 09:24:49 |
|
2016-07-08 21:24:15 |
|
2016-06-28 22:30:31 |
|
2016-06-17 09:27:24 |
|
2016-04-27 00:04:02 |
|
2015-10-18 17:22:27 |
|
2015-07-24 13:29:05 |
|
2015-05-21 13:31:07 |
|
2015-04-15 09:27:45 |
|
2015-04-14 13:28:42 |
|
2015-04-14 09:27:14 |
|
2015-04-11 13:28:39 |
|
2015-04-02 09:25:50 |
|
2015-03-31 13:28:15 |
|
2015-03-27 13:28:02 |
|
2015-03-24 21:26:16 |
|
2015-03-21 00:25:27 |
|
2015-03-20 00:25:19 |
|
2015-03-18 09:26:25 |
|
2015-02-19 13:24:44 |
|
2015-01-23 13:24:37 |
|
2015-01-22 17:22:56 |
|
2015-01-21 13:26:42 |
|
2015-01-08 13:27:56 |
|
2014-12-17 13:25:19 |
|
2014-11-19 09:22:52 |
|
2014-10-22 13:25:43 |
|
2014-10-12 13:27:10 |
|
2014-09-05 13:24:17 |
|
2014-09-04 13:25:12 |
|
2014-08-24 13:25:17 |
|
2014-08-22 13:27:15 |
|
2014-08-22 13:26:47 |
|
2014-08-16 13:27:16 |
|
2014-08-09 13:25:10 |
|
2014-08-08 13:24:41 |
|
2014-08-05 05:26:40 |
|
2014-08-01 13:24:55 |
|
2014-07-31 13:25:06 |
|
2014-07-27 13:27:01 |
|
2014-07-26 13:27:50 |
|
2014-07-26 00:20:32 |
|
2014-07-25 13:21:40 |
|
2014-07-22 13:25:07 |
|
2014-07-22 05:26:57 |
|
2014-07-20 17:21:53 |
|