{"id":"MGASA-2014-0304","summary":"Updated apache package fixes security vulnerabilities","details":"A race condition flaw, leading to heap-based buffer overflows, was found in\nthe mod_status httpd module. A remote attacker able to access a status page\nserved by mod_status on a server using a threaded Multi-Processing Module\n(MPM) could send a specially crafted request that would cause the httpd\nchild process to crash or, possibly, allow the attacker to execute\narbitrary code with the privileges of the \"apache\" user (CVE-2014-0226).\n\nA denial of service flaw was found in the way httpd's mod_deflate module\nhandled request body decompression (configured via the \"DEFLATE\" input\nfilter). A remote attacker able to send a request whose body would be\ndecompressed could use this flaw to consume an excessive amount of system\nmemory and CPU on the target system (CVE-2014-0118).\n\nA denial of service flaw was found in the way httpd's mod_cgid module\nexecuted CGI scripts that did not read data from the standard input.\nA remote attacker could submit a specially crafted request that would cause\nthe httpd child process to hang indefinitely (CVE-2014-0231).\n","modified":"2026-04-16T06:24:25.746823479Z","published":"2014-07-29T21:30:55Z","upstream":["CVE-2014-0118","CVE-2014-0226","CVE-2014-0231"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0304.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=13788"},{"type":"WEB","url":"http://httpd.apache.org/security/vulnerabilities_24.html"},{"type":"WEB","url":"https://rhn.redhat.com/errata/RHSA-2014-0921.html"}],"affected":[{"package":{"name":"apache","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/apache?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.4-7.8.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0304.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}