CVE-2014-0226

NameCVE-2014-0226
DescriptionRace condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-66-1, DSA-2989-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
apache2 (PTS)bullseye2.4.62-1~deb11u1fixed
bullseye (security)2.4.61-1~deb11u1fixed
bookworm2.4.62-1~deb12u1fixed
bookworm (security)2.4.62-1~deb12u2fixed
sid, trixie2.4.62-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
apache2sourcesqueeze2.2.16-6+squeeze13DLA-66-1
apache2sourcewheezy2.2.22-13+deb7u3DSA-2989-1
apache2source(unstable)2.4.10-1

Search for package or bug name: Reporting problems