HTTP: Apache Server Mod Status Race Condition Buffer Overflow

A race condition flaw, leading to heap-based buffer overflows, was found in the aache server. A remote attacker could send a specially crafted request that would cause the httpd child process to crash or, possibly, allow the attacker to execute arbitrary code with the privileges of the apache user.

Extended Description

Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.

Affected Products

Oracle http_server

Short Name
HTTP:APACHE:SERVER-MOD-STATS-BO
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Apache Buffer CVE-2014-0226 CVE-2019-16724 Condition Mod Overflow Race Server Status bid:68678
Release Date
09/18/2014
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3590
False Positive
Unknown
Vendors

Oracle

Apache

Debian

CVSS Score

6.8

Found a potential security threat?