Amazon Linux 1 Security Advisory: ALAS-2014-309
Advisory Release Date: 2014-03-24 23:33 Pacific
Advisory Updated Date: 2014-09-17 22:53 Pacific
The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.
Affected Packages:
httpd24
Issue Correction:
Run yum update httpd24 to update your system.
i686:
httpd24-debuginfo-2.4.9-1.54.amzn1.i686
httpd24-2.4.9-1.54.amzn1.i686
httpd24-devel-2.4.9-1.54.amzn1.i686
mod24_ldap-2.4.9-1.54.amzn1.i686
mod24_ssl-2.4.9-1.54.amzn1.i686
httpd24-tools-2.4.9-1.54.amzn1.i686
mod24_session-2.4.9-1.54.amzn1.i686
mod24_proxy_html-2.4.9-1.54.amzn1.i686
noarch:
httpd24-manual-2.4.9-1.54.amzn1.noarch
src:
httpd24-2.4.9-1.54.amzn1.src
x86_64:
mod24_ldap-2.4.9-1.54.amzn1.x86_64
httpd24-2.4.9-1.54.amzn1.x86_64
mod24_proxy_html-2.4.9-1.54.amzn1.x86_64
mod24_session-2.4.9-1.54.amzn1.x86_64
httpd24-tools-2.4.9-1.54.amzn1.x86_64
httpd24-debuginfo-2.4.9-1.54.amzn1.x86_64
mod24_ssl-2.4.9-1.54.amzn1.x86_64
httpd24-devel-2.4.9-1.54.amzn1.x86_64