CVE-2014-0098

MEDIUM

Description

The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.

References

http://advisories.mageia.org/MGASA-2014-0135.html

http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html

http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10698

http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html

http://marc.info/?l=bugtraq&m=141017844705317&w=2

http://marc.info/?l=bugtraq&m=141390017113542&w=2

http://seclists.org/fulldisclosure/2014/Dec/23

http://secunia.com/advisories/58230

http://secunia.com/advisories/58915

http://secunia.com/advisories/59219

http://secunia.com/advisories/59315

http://secunia.com/advisories/59345

http://secunia.com/advisories/60536

http://security.gentoo.org/glsa/glsa-201408-12.xml

http://support.f5.com/kb/en-us/solutions/public/15000/300/sol15320.html

http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGES

http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/loggers/mod_log_config.c

http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/loggers/mod_log_config.c?r1=1575394&r2=1575400&diff_format=h

http://www.apache.org/dist/httpd/CHANGES_2.4.9

http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html

http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html

http://www.securityfocus.com/archive/1/534161/100/0/threaded

http://www.securityfocus.com/bid/66303

http://www.ubuntu.com/usn/USN-2152-1

http://www.vmware.com/security/advisories/VMSA-2014-0012.html

http://www-01.ibm.com/support/docview.wss?uid=swg21668973

http://www-01.ibm.com/support/docview.wss?uid=swg21676091

http://www-01.ibm.com/support/docview.wss?uid=swg21676092

https://blogs.oracle.com/sunsecurity/entry/multiple_input_validation_vulnerabilities_in1

https://httpd.apache.org/security/vulnerabilities_24.html

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://puppet.com/security/cve/cve-2014-0098

https://support.apple.com/HT204659

https://support.apple.com/kb/HT6535

Details

Source: MITRE

Published: 2014-03-18

Updated: 2021-03-30

Type: CWE-20

Risk Information

CVSS v2.0

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.64:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.1.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.1.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.1.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.1.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.1.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.1.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.1.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.1.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.1.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.24:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.25:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.3.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.3.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.3.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.3.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.3.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.3.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.3.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.3.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.3.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.3.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.3.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.3.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.3.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.3.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.3.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.3.15:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.3.16:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* versions up to 2.4.7 (inclusive)

Tenable Plugins

View all (45 total)

IDNameProductFamilySeverity
144290IBM HTTP Server 8.5.0.0 <= 8.5.5.1 / 8.0.0.0 <= 8.0.0.8 / 7.0.0.0 <= 7.0.0.31 / 6.1.0.0 <= 6.1.0.47 (242057)NessusWeb Servers
medium
124922EulerOS Virtualization 3.0.1.0 : httpd (EulerOS-SA-2019-1419)NessusHuawei Local Security Checks
high
700510Mac OS X 10.10.x < 10.10.3 Multiple VulnerabilitiesNessus Network MonitorOperating System Detection
critical
98905Apache 2.4.x < 2.4.9 Multiple VulnerabilitiesWeb Application ScanningComponent Vulnerability
medium
9699IBM WebSphere Application Server 7.0 < 7.0.0.33 Multiple VulnerabilitiesNessus Network MonitorWeb Servers
critical
91778Juniper Junos Space < 15.1R1 Multiple Vulnerabilities (JSA10698)NessusJunos Local Security Checks
critical
84878Juniper NSM < 2012.2R9 Apache HTTP Server Multiple Vulnerabilities (JSA10685) (credentialed check)NessusMisc.
medium
84877Juniper NSM < 2012.2R9 Apache HTTP Server Multiple Vulnerabilities (JSA10685)NessusMisc.
medium
83632SUSE SLES10 Security Update : apache2 (SUSE-SU-2014:1082-1)NessusSuSE Local Security Checks
medium
82700Mac OS X Multiple Vulnerabilities (Security Update 2015-004) (FREAK)NessusMacOS X Local Security Checks
critical
82699Mac OS X 10.10.x < 10.10.3 Multiple Vulnerabilities (FREAK)NessusMacOS X Local Security Checks
critical
82346Mandriva Linux Security Advisory : apache (MDVSA-2015:093)NessusMandriva Local Security Checks
medium
81002Oracle Fusion Middleware Oracle HTTP Server Multiple Vulnerabilities (January 2015 CPU)NessusWeb Servers
high
80588Oracle Solaris Third-Party Patch Update : apache (multiple_input_validation_vulnerabilities_in1)NessusSolaris Local Security Checks
medium
80043openSUSE Security Update : apache2 (openSUSE-SU-2014:1647-1)NessusSuSE Local Security Checks
medium
78550Mac OS X < 10.10 Multiple Vulnerabilities (POODLE) (Shellshock)NessusMacOS X Local Security Checks
critical
78274Amazon Linux AMI : httpd (ALAS-2014-331)NessusAmazon Linux Local Security Checks
medium
77456GLSA-201408-12 : Apache HTTP Server: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
77438IBM WebSphere Application Server 8.5 < Fix Pack 8.5.5.3 Multiple VulnerabilitiesNessusWeb Servers
medium
77292openSUSE Security Update : apache2 (openSUSE-SU-2014:1044-1)NessusSuSE Local Security Checks
medium
77291openSUSE Security Update : apache2 (openSUSE-SU-2014:1045-1)NessusSuSE Local Security Checks
medium
77048SuSE 11.3 Security Update : Apache Web Server (SAT Patch Number 9542)NessusSuSE Local Security Checks
medium
76995IBM WebSphere Application Server 8.0 < Fix Pack 9 Multiple VulnerabilitiesNessusWeb Servers
high
76967IBM WebSphere Application Server 7.0 < Fix Pack 33 Multiple VulnerabilitiesNessusWeb Servers
high
76570Oracle Secure Global Desktop Multiple Vulnerabilities (July 2014 CPU)NessusMisc.
high
76398RHEL 5 / 6 : JBoss EAP (RHSA-2014:0826)NessusRed Hat Local Security Checks
medium
76242RHEL 5 / 6 : JBoss Web Server (RHSA-2014:0783)NessusRed Hat Local Security Checks
medium
73660Fedora 19 : httpd-2.4.9-1.fc19 (2014-5004)NessusFedora Local Security Checks
medium
73405Apache 2.2.x < 2.2.27 Multiple VulnerabilitiesNessusWeb Servers
medium
73369Scientific Linux Security Update : httpd on SL6.x i386/x86_64 (20140403)NessusScientific Linux Local Security Checks
medium
73368Scientific Linux Security Update : httpd on SL5.x i386/x86_64 (20140403)NessusScientific Linux Local Security Checks
medium
73326RHEL 6 : httpd (RHSA-2014:0370)NessusRed Hat Local Security Checks
medium
73325RHEL 5 : httpd (RHSA-2014:0369)NessusRed Hat Local Security Checks
medium
73324Oracle Linux 6 : httpd (ELSA-2014-0370)NessusOracle Linux Local Security Checks
medium
73323Oracle Linux 5 : httpd (ELSA-2014-0369)NessusOracle Linux Local Security Checks
medium
73320CentOS 6 : httpd (CESA-2014:0370)NessusCentOS Local Security Checks
medium
73319CentOS 5 : httpd (CESA-2014:0369)NessusCentOS Local Security Checks
medium
73265Fedora 20 : httpd-2.4.9-2.fc20 (2014-4555)NessusFedora Local Security Checks
medium
73248Slackware 14.0 / 14.1 / current : httpd (SSA:2014-086-02)NessusSlackware Local Security Checks
medium
73228Amazon Linux AMI : httpd24 (ALAS-2014-309)NessusAmazon Linux Local Security Checks
medium
73179Ubuntu 10.04 LTS / 12.04 LTS / 12.10 / 13.10 : apache2 vulnerabilities (USN-2152-1)NessusUbuntu Local Security Checks
medium
73151FreeBSD : apache -- several vulnerabilities (91ecb546-b1e6-11e3-980f-20cf30e32f6d)NessusFreeBSD Local Security Checks
medium
73128Mandriva Linux Security Advisory : apache (MDVSA-2014:065)NessusMandriva Local Security Checks
medium
8165Apache HTTP Server < 2.4.8 Multiple VulnerabilitiesNessus Network MonitorWeb Servers
medium
73081Apache 2.4.x < 2.4.8 Multiple VulnerabilitiesNessusWeb Servers
medium