Bug 1120596 (CVE-2014-0231)
Summary: | CVE-2014-0231 httpd: mod_cgid denial of service | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Murray McAllister <mmcallis> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | anmiller, bdunne, bressers, cdewolf, chazlett, dajohnso, dandread, darran.lofthouse, dclarizi, dknox, fnasser, gmccullo, grocha, huwang, jason.greene, jawilson, jclere, jdoyle, jfrey, jkaluza, jkudrnac, jorton, jprause, jrafanie, jvlcek, kseifried, lgao, mmaslano, myarboro, obarenbo, pahan, pgier, pslavice, rmeggins, rsvoboda, vtunka, webstack-team, weli, xlecauch |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | httpd 2.4.10 | Doc Type: | Bug Fix |
Doc Text: |
A denial of service flaw was found in the way httpd's mod_cgid module executed CGI scripts that did not read data from the standard input. A remote attacker could submit a specially crafted request that would cause the httpd child process to hang indefinitely.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2015-07-10 02:47:21 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1120605, 1120606, 1120607, 1120608, 1120612, 1120613, 1120614, 1120935, 1120936, 1120937, 1120938, 1120939, 1120940, 1121037, 1121038 | ||
Bug Blocks: | 1064757, 1116304, 1120610, 1120623 |
Description
Murray McAllister
2014-07-17 09:06:08 UTC
Created httpd tracking bugs for this issue: Affects: fedora-all [bug 1120614] Upstream commits: http://svn.apache.org/viewvc?view=revision&revision=1535125 http://svn.apache.org/viewvc?view=revision&revision=1610509 2.4 backport: http://svn.apache.org/viewvc?view=revision&revision=1610512 This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2014:0920 https://rhn.redhat.com/errata/RHSA-2014-0920.html This issue has been addressed in following products: Red Hat Software Collections 1 for Red Hat Enterprise Linux 6 Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.4 EUS Red Hat Software Collections 1 for Red Hat Enterprise Linux 7 Via RHSA-2014:0922 https://rhn.redhat.com/errata/RHSA-2014-0922.html This issue has been addressed in following products: Red Hat Enterprise Linux 7 Via RHSA-2014:0921 https://rhn.redhat.com/errata/RHSA-2014-0921.html @Andrew As I am working on this verification only as kind of a backup, would you mind being more specific about how to determine the status of httpd child processes? httpd-2.4.10-1.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. IssueDescription: A denial of service flaw was found in the way httpd's mod_cgid module executed CGI scripts that did not read data from the standard input. A remote attacker could submit a specially crafted request that would cause the httpd child process to hang indefinitely. This issue has been addressed in following products: JBoss Enterprise Application Platform 6.3.0 Via RHSA-2014:1021 https://rhn.redhat.com/errata/RHSA-2014-1021.html This issue has been addressed in following products: JBEAP 6 for RHEL 6 Via RHSA-2014:1020 https://rhn.redhat.com/errata/RHSA-2014-1020.html This issue has been addressed in following products: JBEAP 6 for RHEL 5 Via RHSA-2014:1019 https://rhn.redhat.com/errata/RHSA-2014-1019.html httpd-2.4.10-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in following products: JBEWS 2 for RHEL 5 Via RHSA-2014:1088 https://rhn.redhat.com/errata/RHSA-2014-1088.html This issue has been addressed in following products: JBEWS 2 for RHEL 6 Via RHSA-2014:1087 https://rhn.redhat.com/errata/RHSA-2014-1087.html This issue has been addressed in following products: JBoss Web Server 2.1.0 Via RHSA-2014:1086 https://rhn.redhat.com/errata/RHSA-2014-1086.html |