CVE-2014-0226 (CNNVD-201407-493)
中文标题:
Apache HTTP Server mod_status模块竞争条件漏洞
英文标题:
Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attack...
漏洞描述
中文描述:
Apache HTTP Server是美国阿帕奇(Apache)软件基金会的一款开源网页服务器。mod_status是其中的一个用于生成描述服务器状态的Web页面的模块。 Apache HTTP Server 2.4.1至2.4.9版本的mod_status模块的modules/generators/mod_status.c文件中的‘status_handler’函数和modules/lua/lua_request.c文件中的‘lua_ap_scoreboard_worker’函数存在竞争条件漏洞。远程攻击者可通过发送特制的请求利用该漏洞造成拒绝服务(基于堆的缓冲区溢出),或获取敏感信息,也可能执行任意代码。
英文描述:
Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| apache | http_server | * | - | - |
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
|
| debian | debian_linux | 7.0 | - | - |
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 8.0 | - | - |
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
|
| redhat | jboss_enterprise_application_platform | 6.0.0 | - | - |
cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*
|
| redhat | jboss_enterprise_application_platform | 6.4.0 | - | - |
cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.4.0:*:*:*:*:*:*:*
|
| oracle | enterprise_manager_ops_center | 11.1.3 | - | - |
cpe:2.3:a:oracle:enterprise_manager_ops_center:11.1.3:*:*:*:*:*:*:*
|
| oracle | enterprise_manager_ops_center | 12.1.4 | - | - |
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.1.4:*:*:*:*:*:*:*
|
| oracle | http_server | 10.1.3.5.0 | - | - |
cpe:2.3:a:oracle:http_server:10.1.3.5.0:*:*:*:*:*:*:*
|
| oracle | http_server | 11.1.1.7.0 | - | - |
cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*
|
| oracle | http_server | 12.1.2.0 | - | - |
cpe:2.3:a:oracle:http_server:12.1.2.0:*:*:*:*:*:*:*
|
| oracle | http_server | 12.1.3.0 | - | - |
cpe:2.3:a:oracle:http_server:12.1.3.0:*:*:*:*:*:*:*
|
| oracle | secure_global_desktop | 4.63 | - | - |
cpe:2.3:a:oracle:secure_global_desktop:4.63:*:*:*:*:*:*:*
|
| oracle | secure_global_desktop | 4.71 | - | - |
cpe:2.3:a:oracle:secure_global_desktop:4.71:*:*:*:*:*:*:*
|
| oracle | secure_global_desktop | 5.0 | - | - |
cpe:2.3:a:oracle:secure_global_desktop:5.0:*:*:*:*:*:*:*
|
| oracle | secure_global_desktop | 5.1 | - | - |
cpe:2.3:a:oracle:secure_global_desktop:5.1:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
cve.org
CVSS评分详情
AV:N/AC:M/Au:N/C:P/I:P/A:P
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2014-0226 |
2025-11-11 15:18:42 | 2025-11-11 07:33:42 |
| NVD | nvd_CVE-2014-0226 |
2025-11-11 14:54:33 | 2025-11-11 07:42:28 |
| CNNVD | cnnvd_CNNVD-201407-493 |
2025-11-11 15:09:28 | 2025-11-11 07:51:30 |
| EXPLOITDB | exploitdb_EDB-34133 |
2025-11-11 15:05:24 | 2025-11-11 08:29:16 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 53 -> 56
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 竞争条件问题
- cnnvd_id: 未提取 -> CNNVD-201407-493
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 6.8
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:P/I:P/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 15
- references_count: 55 -> 53
- data_sources: ['cve'] -> ['cve', 'nvd']