Nytro Posted July 18, 2014 Report Posted July 18, 2014 Apache httpd mod_status Heap Buffer Overflow Remote Code Execution VulnerabilityZDI-14-236: July 16th, 2014 CVE IDCVE-2014-0226 CVSS Score7.5, (AV:N/AC:L/Au:N/C:P/I:P/A:P) Affected VendorsApache Affected ProductsHTTPD Server 2.x Vulnerability Details This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apache HTTPD server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the updating of mod_status. A race condition in mod_status allows an attacker to disclose information or corrupt memory with several requests to endpoints with handler server-status and other endpoints. By abusing this flaw, an attacker can possibly disclose credentials or leverage this situation to achieve remote code execution. Vendor Response Apache has issued an update to correct this vulnerability. More details can be found at: svn commit: r1610499 - in /httpd/httpd/branches/2.4.x: ./ CHANGES include/ap_mmn.h include/scoreboard.h modules/generators/mod_status.c modules/lua/lua_request.c server/scoreboard.c Disclosure Timeline2014-05-30 - Vulnerability reported to vendor2014-07-16 - Coordinated public release of advisory Credit This vulnerability was discovered by: AKAT-1 22733db72ab3ed94b5f8a1ffcde850251fe6f466 Marek KroemekeSursa: Zero Day Initiative Quote
issd Posted November 24, 2015 Report Posted November 24, 2015 i need help exploiting this error . Quote