Essentials

Download!

Documentation

Get Support

Get Involved

Subprojects

Miscellaneous

Apache httpd 2.4 vulnerabilities

This page lists all security vulnerabilities fixed in released versions of Apache httpd 2.4. Each vulnerability is given a security impact rating by the Apache security team - please note that this rating may well vary from platform to platform. We also list the versions of Apache httpd the flaw is known to affect, and where a flaw has not been verified list the version with a question mark.

Please note that if a vulnerability is shown below as being fixed in a "-dev" release then this means that a fix has been applied to the development source tree and will be part of an upcoming full release.

This page is created from a database of vulnerabilities originally populated by Apache Week. Please send comments or corrections for these vulnerabilities to the Security Team.

The initial GA release, Apache httpd 2.4.1, includes fixes for all vulnerabilities which have been resolved in Apache httpd 2.2.22 and all older releases. Consult the Apache httpd 2.2 vulnerabilities list for more information.

Fixed in Apache httpd 2.4.11-dev

low: mod_proxy_fcgi out-of-bounds memory read CVE-2014-3583

An out-of-bounds memory read was found in mod_proxy_fcgi. A malicious FastCGI server could send a carefully crafted response which could lead to a crash when reading past the end of a heap memory or stack buffer. This issue affects version 2.4.10 only.

Acknowledgements: This issue was reported by Teguh P. Alko.

Reported to security team: 17th September 2014
Issue public: 12th November 2014
Affects: 2.4.10

low: mod_cache crash with empty Content-Type header CVE-2014-3581

A NULL pointer deference was found in mod_cache. A malicious HTTP server could cause a crash in a caching forward proxy configuration. This crash would only be a denial of service if using a threaded MPM.

Issue public: 8th September 2014
Affects: 2.4.10, 2.4.9, 2.4.8, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1

low: HTTP Trailers processing bypass CVE-2013-5704

HTTP trailers could be used to replace HTTP headers late during request processing, potentially undoing or otherwise confusing modules that examined or modified request headers earlier.

This fix adds the "MergeTrailers" directive to restore legacy behavior.

Acknowledgements: This issue was reported by Martin Holst Swende.

Reported to security team: 6th September 2013
Issue public: 19th October 2013
Affects: 2.4.10, 2.4.9, 2.4.8, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1

Fixed in Apache httpd 2.4.10

important: mod_cgid denial of service CVE-2014-0231

A flaw was found in mod_cgid. If a server using mod_cgid hosted CGI scripts which did not consume standard input, a remote attacker could cause child processes to hang indefinitely, leading to denial of service.

Acknowledgements: This issue was reported by Rainer Jung of the ASF

Reported to security team: 16th June 2014
Issue public: 14th July 2014
Update Released: 14th July 2014
Affects: 2.4.9, 2.4.8, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1

important: WinNT MPM denial of service CVE-2014-3523

A flaw was found in the WinNT MPM in httpd versions 2.4.1 to 2.4.9, when using the default AcceptFilter for that platform. A remote attacker could send carefully crafted requests that would leak memory and eventually lead to a denial of service against the server.

Acknowledgements: This issue was reported by Jeff Trawick of the ASF

Reported to security team: 1st July 2014
Issue public: 15th July 2014
Update Released: 15th July 2014
Affects: 2.4.9, 2.4.8, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1

moderate: mod_proxy denial of service CVE-2014-0117

A flaw was found in mod_proxy in httpd versions 2.4.6 to 2.4.9. A remote attacker could send a carefully crafted request to a server configured as a reverse proxy, and cause the child process to crash. This could lead to a denial of service against a threaded MPM.

Acknowledgements: This issue was reported by Marek Kroemeke, AKAT-1 and 22733db72ab3ed94b5f8a1ffcde850251fe6f466 via HP ZDI

Reported to security team: 7th April 2014
Issue public: 15th July 2014
Update Released: 15th July 2014
Affects: 2.4.9, 2.4.8, 2.4.7, 2.4.6

moderate: mod_deflate denial of service CVE-2014-0118

A resource consumption flaw was found in mod_deflate. If request body decompression was configured (using the "DEFLATE" input filter), a remote attacker could cause the server to consume significant memory and/or CPU resources. The use of request body decompression is not a common configuration.

Acknowledgements: This issue was reported by Giancarlo Pellegrino and Davide Balzarotti

Reported to security team: 19th February 2014
Issue public: 14th July 2014
Update Released: 14th July 2014
Affects: 2.4.9, 2.4.8, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1

moderate: mod_status buffer overflow CVE-2014-0226

A race condition was found in mod_status. An attacker able to access a public server status page on a server using a threaded MPM could send a carefully crafted request which could lead to a heap buffer overflow. Note that it is not a default or recommended configuration to have a public accessible server status page.

Acknowledgements: This issue was reported by Marek Kroemeke, AKAT-1 and 22733db72ab3ed94b5f8a1ffcde850251fe6f466 via HP ZDI

Reported to security team: 30th May 2014
Issue public: 14th July 2014
Update Released: 14th July 2014
Affects: 2.4.9, 2.4.8, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1

Fixed in Apache httpd 2.4.7

low: mod_cache crash CVE-2013-4352

A NULL pointer dereference was found in mod_cache. A malicious HTTP server could cause a crash in a caching forward proxy configuration. (Note that this vulnerability was fixed in the 2.4.7 release, but the security impact was not disclosed at the time of the release.)

Reported to security team: 14th September 2013
Issue public: 14th July 2014
Update Released: 26th November 2013
Affects: 2.4.6

Fixed in Apache httpd 2.4.9

low: mod_log_config crash CVE-2014-0098

A flaw was found in mod_log_config. A remote attacker could send a specific truncated cookie causing a crash. This crash would only be a denial of service if using a threaded MPM.

Acknowledgements: This issue was reported by Rainer M Canavan

Reported to security team: 25th February 2014
Issue public: 17th March 2014
Update Released: 17th March 2014
Affects: 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1

moderate: mod_dav crash CVE-2013-6438

XML parsing code in mod_dav incorrectly calculates the end of the string when removing leading spaces and places a NUL character outside the buffer, causing random crashes. This XML parsing code is only used with DAV provider modules that support DeltaV, of which the only publicly released provider is mod_dav_svn.

Acknowledgements: This issue was reported by Ning Zhang & Amin Tora of Neustar

Reported to security team: 10th December 2013
Issue public: 17th March 2014
Update Released: 17th March 2014
Affects: 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1

Fixed in Apache httpd 2.4.6

moderate: mod_dav crash CVE-2013-1896

Sending a MERGE request against a URI handled by mod_dav_svn with the source href (sent as part of the request body as XML) pointing to a URI that is not configured for DAV will trigger a segfault.

Acknowledgements: This issue was reported by Ben Reser

Reported to security team: 7th March 2013
Issue public: 23rd May 2013
Update Released: 22nd July 2013
Affects: 2.4.4, 2.4.3, 2.4.2, 2.4.1

moderate: mod_session_dbd session fixation flaw CVE-2013-2249

A flaw in mod_session_dbd caused it to proceed with save operations for a session without considering the dirty flag and the requirement for a new session ID.

Acknowledgements: This issue was reported by Takashi Sato

Reported to security team: 29th May 2013
Issue public: 22nd July 2013
Update Released: 22nd July 2013
Affects: 2.4.4, 2.4.3, 2.4.2, 2.4.1

Fixed in Apache httpd 2.4.4

low: XSS due to unescaped hostnames CVE-2012-3499

Various XSS flaws due to unescaped hostnames and URIs HTML output in mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp.

Acknowledgements: This issue was reported by Niels Heinen of Google

Reported to security team: 11th July 2012
Issue public: 18th February 2013
Update Released: 25th February 2013
Affects: 2.4.3, 2.4.2, 2.4.1

moderate: XSS in mod_proxy_balancer CVE-2012-4558

A XSS flaw affected the mod_proxy_balancer manager interface.

Acknowledgements: This issue was reported by Niels Heinen of Google

Reported to security team: 7th October 2012
Issue public: 18th February 2013
Update Released: 25th February 2013
Affects: 2.4.3, 2.4.2, 2.4.1

Fixed in Apache httpd 2.4.3

important: Response mixup when using mod_proxy_ajp or mod_proxy_http CVE-2012-3502

The modules mod_proxy_ajp and mod_proxy_http did not always close the connection to the back end server when necessary as part of error handling. This could lead to an information disclosure due to a response mixup between users.

Issue public: 16th August 2012
Update Released: 21st August 2012
Affects: 2.4.2, 2.4.1

low: XSS in mod_negotiation when untrusted uploads are supported CVE-2012-2687

Possible XSS for sites which use mod_negotiation and allow untrusted uploads to locations which have MultiViews enabled.

Note: This issue is also known as CVE-2008-0455.

Reported to security team: 31st May 2012
Issue public: 13th June 2012
Update Released: 21st August 2012
Affects: 2.4.2, 2.4.1

Fixed in Apache httpd 2.4.2

low: insecure LD_LIBRARY_PATH handling CVE-2012-0883

Insecure handling of LD_LIBRARY_PATH was found that could lead to the current working directory to be searched for DSOs. This could allow a local user to execute code as root if an administrator runs apachectl from an untrusted directory.

Reported to security team: 14th February 2012
Issue public: 2nd March 2012
Update Released: 17th April 2012
Affects: 2.4.1