[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2015-483 --- httpd24, mod24_session

ID: oval:org.secpod.oval:def:1200166Date: (C)2015-12-28   (M)2023-12-18
Class: PATCHFamily: unix




mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multiple Require directives, as demonstrated by a configuration that specifies authorization for one group to access a certain directory, and authorization for a second group to access a second directory. A flaw was found in the way httpd handled HTTP Trailer headers when processing requests using chunked encoding. A malicious client could use Trailer headers to set additional HTTP headers after header processing was performed by other modules. This could, for example, lead to a bypass of header restrictions defined with mod_headers. A NULL pointer dereference flaw was found in the way the mod_cache httpd module handled Content-Type headers. A malicious HTTP server could cause the httpd child process to crash when the Apache HTTP server was configured to proxy to a server with caching enabled. The handle_headers function in mod_proxy_fcgi.c in the mod_proxy_fcgi module in the Apache HTTP Server 2.4.10 allows remote FastCGI servers to cause a denial of service via long response headers

Platform:
Amazon Linux AMI
Product:
httpd24
mod24_session
Reference:
ALAS-2015-483
CVE-2014-8109
CVE-2013-5704
CVE-2014-3581
CVE-2014-3583
CVE    4
CVE-2013-5704
CVE-2014-3583
CVE-2014-3581
CVE-2014-8109
...
CPE    2
cpe:/o:amazon:linux
cpe:/a:apache:httpd24

© SecPod Technologies