Heap-based buffer overflow vulnerability in mod_status module in the Apache HTTP Server (Mac OS X)ID: oval:org.secpod.oval:def:24400 | Date: (C)2015-05-27 (M)2023-12-07 |
Class: VULNERABILITY | Family: macos |
The host is installed with Apple Mac OS X or Server 10.8.5, 10.9.5 or 10.10.x through 10.10.2 and is prone to a heap-based buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c. Successful exploitation allows attackers to remote attackers to execute arbitrary code, disclose sensitive information or crash the service.
Platform: |
Apple Mac OS X 10.8 |
Apple Mac OS X Server 10.8 |
Apple Mac OS X 10.9 |
Apple Mac OS X Server 10.9 |
Apple Mac OS X 10.10 |
Apple Mac OS X Server 10.10 |