Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2014-0226 — Race Condition in Apache Http Server
Severity
6.8MEDIUMNVD
EPSS
75.4%
top 1.11%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJul 20
Latest updateMay 13
Description
Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
CVSS vector
AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4
Affected Packages5 packages
Also affects: Debian Linux 7.0, 8.0
Patches
🔴Vulnerability Details
4GHSA▶
GHSA-9c3m-phm4-whxx: Race condition in the mod_status module in the Apache HTTP Server before 2↗2022-05-13
OSV▶
CVE-2014-0226: Race condition in the mod_status module in the Apache HTTP Server before 2↗2014-07-20
CVEList▶
CVE-2014-0226: Race condition in the mod_status module in the Apache HTTP Server before 2↗2014-07-20
💥Exploits & PoCs
1📋Vendor Advisories
4Debian▶
CVE-2014-0226: apache2 - Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 ...↗2014