Think you have a false positive on this rule?

Sid 1-51547

Message

SERVER-APACHE Apache cookie logging denial of service attempt

Summary

This event is generated when an Apache cookie logging denial of service attempt is detected.

Impact

Detection of a Denial of Service Attack

CVE-2014-0098:

CVSS base score 5.0

CVSS impact score 2.9

CVSS exploitability score 10.0

Confidentiality Impact NONE

Integrity Impact NONE

Availability Impact PARTIAL

Detailed information

CVE-2014-0098: The logcookie function in modlogconfig.c in the modlog_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.

Affected systems

  • apache http_server 2.0
  • apache http_server 2.0.9
  • apache http_server 2.0.28
  • apache http_server 2.0.32
  • apache http_server 2.0.34
  • apache http_server 2.0.35
  • apache http_server 2.0.36
  • apache http_server 2.0.37
  • apache http_server 2.0.38
  • apache http_server 2.0.39
  • apache http_server 2.0.40
  • apache http_server 2.0.41
  • apache http_server 2.0.42
  • apache http_server 2.0.43
  • apache http_server 2.0.44
  • apache http_server 2.0.45
  • apache http_server 2.0.46
  • apache http_server 2.0.47
  • apache http_server 2.0.48
  • apache http_server 2.0.49
  • apache http_server 2.0.50
  • apache http_server 2.0.51
  • apache http_server 2.0.52
  • apache http_server 2.0.53
  • apache http_server 2.0.54
  • apache http_server 2.0.55
  • apache http_server 2.0.56
  • apache http_server 2.0.57
  • apache http_server 2.0.58
  • apache http_server 2.0.59
  • apache http_server 2.0.60
  • apache http_server 2.0.61
  • apache http_server 2.0.63
  • apache http_server 2.0.64
  • apache http_server 2.1
  • apache http_server 2.1.1
  • apache http_server 2.1.2
  • apache http_server 2.1.3
  • apache http_server 2.1.4
  • apache http_server 2.1.5
  • apache http_server 2.1.6
  • apache http_server 2.1.7
  • apache http_server 2.1.8
  • apache http_server 2.1.9
  • apache http_server 2.2
  • apache http_server 2.2.0
  • apache http_server 2.2.1
  • apache http_server 2.2.2
  • apache http_server 2.2.3
  • apache http_server 2.2.4
  • apache http_server 2.2.6
  • apache http_server 2.2.8
  • apache http_server 2.2.9
  • apache http_server 2.2.10
  • apache http_server 2.2.11
  • apache http_server 2.2.12
  • apache http_server 2.2.13
  • apache http_server 2.2.14
  • apache http_server 2.2.15
  • apache http_server 2.2.16
  • apache http_server 2.2.17
  • apache http_server 2.2.18
  • apache http_server 2.2.19
  • apache http_server 2.2.20
  • apache http_server 2.2.21
  • apache http_server 2.2.22
  • apache http_server 2.2.23
  • apache http_server 2.2.24
  • apache http_server 2.2.25
  • apache http_server 2.3.0
  • apache http_server 2.3.1
  • apache http_server 2.3.2
  • apache http_server 2.3.3
  • apache http_server 2.3.4
  • apache http_server 2.3.5
  • apache http_server 2.3.6
  • apache http_server 2.3.7
  • apache http_server 2.3.8
  • apache http_server 2.3.9
  • apache http_server 2.3.10
  • apache http_server 2.3.11
  • apache http_server 2.3.12
  • apache http_server 2.3.13
  • apache http_server 2.3.14
  • apache http_server 2.3.15
  • apache http_server 2.3.16
  • apache http_server 2.4.0
  • apache http_server 2.4.1
  • apache http_server 2.4.2
  • apache http_server 2.4.3
  • apache http_server 2.4.4
  • apache http_server 2.4.6
  • apache http_server 2.4.7

Ease of attack

CVE-2014-0098:

Access Vector NETWORK

Access Complexity LOW

Authentication NONE

False positives

False negatives

Corrective action

Contributors

  • Cisco Talos Intelligence Group

Additional References