CVE-2014-0231

Severity

50%

Complexity

99%

Confidentiality

48%

The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.

The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.

CVSS 2.0 Base Score 5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:N/A:P).

Overview

Type

Apache HTTP Server

First reported 10 years ago

2014-07-20 11:12:00

Last updated 6 years ago

2018-10-30 16:25:00

Affected Software

Apache Software Foundation Apache HTTP Server

Apache Software Foundation Apache HTTP Server 2.2.0

2.2.0

Apache Software Foundation Apache HTTP Server 2.2.2

2.2.2

Apache Software Foundation Apache HTTP Server 2.2.3

2.2.3

Apache Software Foundation Apache HTTP Server 2.2.4

2.2.4

Apache Software Foundation Apache HTTP Server 2.2.6

2.2.6

Apache Software Foundation Apache HTTP Server 2.2.8

2.2.8

Apache Software Foundation Apache HTTP Server 2.2.9

2.2.9

Apache Software Foundation Apache HTTP Server 2.2.10

2.2.10

Apache Software Foundation Apache HTTP Server 2.2.11

2.2.11

Apache Software Foundation Apache HTTP Server 2.2.12

2.2.12

Apache Software Foundation Apache HTTP Server 2.2.13

2.2.13

Apache Software Foundation Apache HTTP Server 2.2.14

2.2.14

Apache Software Foundation Apache HTTP Server 2.2.15

2.2.15

Apache Software Foundation Apache HTTP Server 2.2.16

2.2.16

Apache Software Foundation Apache HTTP Server 2.2.17

2.2.17

Apache Software Foundation Apache HTTP Server 2.2.18

2.2.18

Apache Software Foundation Apache HTTP Server 2.2.19

2.2.19

Apache Software Foundation Apache HTTP Server 2.2.20

2.2.20

Apache HTTP Server 2.2.21

2.2.21

Apache Software Foundation Apache HTTP Server 2.2.22

2.2.22

Apache Software Foundation Apache HTTP Server 2.2.23

2.2.23

Apache Software Foundation Apache HTTP Server 2.2.24

2.2.24

Apache Software Foundation Apache HTTP Server 2.2.25

2.2.25

Apache Software Foundation Apache HTTP Server 2.2.26

2.2.26

Apache Software Foundation Apache HTTP Server 2.2.27

2.2.27

Apache Software Foundation Apache HTTP Server 2.4.1

2.4.1

Apache Software Foundation Apache HTTP Server 2.4.2

2.4.2

Apache Software Foundation Apache HTTP Server 2.4.3

2.4.3

Apache Software Foundation Apache HTTP Server 2.4.4

2.4.4

Apache Software Foundation Apache HTTP Server 2.4.6

2.4.6

Apache Software Foundation Apache HTTP Server 2.4.7

2.4.7

Apache Software Foundation Apache HTTP Server 2.4.8

2.4.8

References

http://advisories.mageia.org/MGASA-2014-0304.html

http://advisories.mageia.org/MGASA-2014-0305.html

http://httpd.apache.org/security/vulnerabilities_24.html

Patch, Vendor Advisory

APPLE-SA-2015-04-08-2

SSRT102066

HPSBMU03380

HPSBMU03409

HPSBUX03512

http://packetstormsecurity.com/files/130769/RSA-Digital-Certificate-Solution-XSS-Denial-Of-Service.html

RHSA-2014:1019

RHSA-2014:1020

RHSA-2014:1021

60536

http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES

http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c

http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c?r1=1482522&r2=1535125&diff_format=h

http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/generators/mod_cgid.c?r1=1565711&r2=1610509&diff_format=h

DSA-2989

MDVSA-2014:142

http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

68742

https://bugzilla.redhat.com/show_bug.cgi?id=1120596

https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246

[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html

[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html

[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html

[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html

[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html

[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html

[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html

[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html

https://puppet.com/security/cve/cve-2014-0231

GLSA-201504-03

https://support.apple.com/HT204659

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.