An Apache HTTP server buffer overflow vulnerability could allow attackers to execute code remotely, according to an advisory by the Zero Day Initiative.
The vulnerability can be exploited without authentication by attackers, as the flaw is found in the “mod_status” module.
â€œA race condition in mod_status allows an attacker to disclose information or corrupt memory with several requests to endpoints with handler server-status and other endpoints,â€ said the advisory. â€œBy abusing this flaw, an attacker can possibly disclose credentials or leverage this situation to achieve remote code execution.â€
The vulnerability has received the CVE-2014-0226 ID as the heap_buffer_overflow bug could allow denial of service or arbitrary code execution. Also, according to NISTâ€™s Vulnerability Database, the attackerâ€™s request can trigger â€œimproper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.â€
By way of explanation, the â€œmod_statusâ€ module provides the server administrator with performance information. The performance statistics are presented into a HTML page, as another page provides updates on the serverâ€™s current state.
The status module provides data on the number of idle workers, worker serving requests or their status and number of requests each worker performed.
It gives details on how much traffic the server handled, how many times it booted/restarted and running time. It also handles CPU usage of each worker, current hosts and processed requests, and the number of served bytes per second or per request.
The researcher credited with the finding of this vulnerability is Marek Kroemeke.
Apache HTTP server administrators are advised to update their servers, as the impacted versions are from 2.0 to 2.4.10.