A NULL pointer dereference flaw was found in the way httpd generated certain error responses. A remote attacker could possibly use this flaw to crash the httpd child process using a request that triggers a certain HTTP error.
Find out more about CVE-2015-0253 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue did not affect the versions of httpd as shipped with Red Hat Enterprise Linux 4, 5, 6, and 7; JBoss Enterprise Web Server 1 and 2; JBoss Web Server 3; and JBoss Enterprise Application Platform 6.
Base Score | 2.6 |
---|---|
Base Metrics | AV:N/AC:H/Au:N/C:N/I:N/A:P |
Access Vector | Network |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Software Collections for Red Hat Enterprise Linux 7 (httpd24-httpd) | RHSA-2015:1666 | 2015-08-24 |
Red Hat Software Collections for Red Hat Enterprise Linux 6 (httpd24-httpd) | RHSA-2015:1666 | 2015-08-24 |
Platform | Package | State |
---|---|---|
Red Hat JBoss Web Server 3.0 | httpd24 | Not affected |
Red Hat JBoss EWS 2 | httpd | Not affected |
Red Hat JBoss EWS 1 | httpd | Not affected |
Red Hat JBoss EAP 6 | httpd | Not affected |
Red Hat JBoss EAP 5 | httpd | Not affected |
Red Hat Enterprise Linux 7 | httpd | Not affected |
Red Hat Enterprise Linux 6 | httpd | Not affected |
Red Hat Enterprise Linux 5 | httpd | Not affected |
Red Hat Directory Server 8 | httpd | Not affected |