{"id":"MGASA-2014-0305","summary":"Updated apache package fixes security vulnerabilities","details":"A race condition flaw, leading to heap-based buffer overflows, was found in\nthe mod_status httpd module. A remote attacker able to access a status page\nserved by mod_status on a server using a threaded Multi-Processing Module\n(MPM) could send a specially crafted request that would cause the httpd\nchild process to crash or, possibly, allow the attacker to execute\narbitrary code with the privileges of the \"apache\" user (CVE-2014-0226).\n\nA denial of service flaw was found in the mod_proxy httpd module. A remote\nattacker could send a specially crafted request to a server configured as a\nreverse proxy using a threaded Multi-Processing Modules (MPM) that would\ncause the httpd child process to crash (CVE-2014-0117).\n\nA denial of service flaw was found in the way httpd's mod_deflate module\nhandled request body decompression (configured via the \"DEFLATE\" input\nfilter). A remote attacker able to send a request whose body would be\ndecompressed could use this flaw to consume an excessive amount of system\nmemory and CPU on the target system (CVE-2014-0118).\n\nA denial of service flaw was found in the way httpd's mod_cgid module\nexecuted CGI scripts that did not read data from the standard input.\nA remote attacker could submit a specially crafted request that would cause\nthe httpd child process to hang indefinitely (CVE-2014-0231).\n","modified":"2026-04-16T01:47:28.596895705Z","published":"2014-07-29T21:30:55Z","upstream":["CVE-2014-0117","CVE-2014-0118","CVE-2014-0226","CVE-2014-0231"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0305.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=13788"},{"type":"WEB","url":"http://httpd.apache.org/security/vulnerabilities_24.html"},{"type":"WEB","url":"https://rhn.redhat.com/errata/RHSA-2014-0921.html"}],"affected":[{"package":{"name":"apache","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/apache?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.7-5.3.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0305.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}