Think you have a false positive on this rule?

Sid 1-24698

Message

SERVER-APACHE Apache modlogconfig cookie handling denial of service attempt

Summary

The logcookie function in modlogconfig.c in the modlog_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.

Impact

CVSS base score 2.6 CVSS impact score 2.9 CVSS exploitability score 4.9 confidentialityImpact NONE integrityImpact NONE availabilityImpact NONE

CVE-2012-0021:

CVSS base score 2.6

CVSS impact score 2.9

CVSS exploitability score 4.9

Confidentiality Impact NONE

Integrity Impact NONE

Availability Impact PARTIAL

Detailed information

CVE-2012-0021: The logcookie function in modlogconfig.c in the modlog_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.

Affected systems

  • apache http_server 2.2.17
  • apache http_server 2.2.18
  • apache http_server 2.2.19
  • apache http_server 2.2.20
  • apache http_server 2.2.21

Ease of attack

CVE-2012-0021:

Access Vector NETWORK

Access Complexity HIGH

Authentication NONE

False positives

None known

False negatives

None known

Corrective action

Upgrade to the latest non-affected version of the software.

Apply the appropriate vendor supplied patches.

Contributors

  • Talos research team.
  • This document was generated from data supplied by the national vulnerability database, a product of the national institute of standards and technology.
  • For more information see nvd.

Additional References