Apache – CVE-2014-0226


Kayran has detected that the Version of Apache HTTP Server being used is vulnerable to ‘mod_status buffer overflow’.
CVE-2014-0226 is categorized as a ‘Concurrent Execution using Shared Resource with Improper Synchronization’ vulnerability (CWE-362). A race condition was found in mod_status.

A ‘race condition’ in mod_status allow remote attackers to initiate Denial of Service (DoS) attacks through heap-based buffer overflow against your assets.
This, could also allow attackers to obtain any sensitive credential information or to execute arbitrary codes.
They do so via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c

It will lead to information being disclosed, assisting attackers in performing attacks against your assets.
It will cause a decrease in performance and interruptions in the availability of resources. There’s a chance that this vulnerability will allow attackers to modify system files and information.


To fix CVE-2014-0226, upgrade the version of Apache HTTP Server being used to either 2.2.29 or 2.4.10.




< Return to all Vulnerabilities

What is a CWE ?

Similar to the article written on CVEs, in this article we will answer the questions :What is CWE ? and, what is the difference between

Read More »

Passwords 101

Unlike basketballs, “passwords” are things we don’t want to be passed around, especially in a society built around the idea that “mystery” is appealing. We

Read More »