A NULL pointer dereference flaw was found in the way the mod_cache httpd module handled Content-Type headers. A malicious HTTP server could cause the httpd child process to crash when the Apache HTTP server was configured to proxy to a server with caching enabled.
Find out more about CVE-2014-3581 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue did not affect the versions of httpd as shipped with Red Hat Enterprise Linux 5 and 6, JBoss Enterprise Web Server 1 and 2, and JBoss Application Platform 6.
Base Score | 2.6 |
---|---|
Base Metrics | AV:N/AC:H/Au:N/C:N/I:N/A:P |
Access Vector | Network |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat JBoss Web Server 3.0 for RHEL 7 | RHSA-2015:2660 | 2015-12-16 |
Red Hat JBoss Web Server 3.0 for RHEL 6 | RHSA-2015:2659 | 2015-12-16 |
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6 (httpd24-httpd) | RHSA-2014:1972 | 2014-12-09 |
Red Hat Software Collections 1 for Red Hat Enterprise Linux 7 (httpd24-httpd) | RHSA-2014:1972 | 2014-12-09 |
Red Hat JBoss Web Server 3.0 | RHSA-2015:2661 | 2015-12-16 |
Red Hat Enterprise Linux 7 (httpd) | RHSA-2015:0325 | 2015-03-05 |
Platform | Package | State |
---|---|---|
Red Hat JBoss EWS 2 | httpd | Not affected |
Red Hat JBoss EWS 1 | httpd | Not affected |
Red Hat JBoss EAP 6 | httpd | Not affected |
Red Hat Enterprise Linux 6 | httpd | Not affected |
Red Hat Enterprise Linux 5 | httpd | Not affected |
Red Hat Enterprise Linux 4 | httpd | Not affected |
Red Hat Directory Server 8 | httpd | Not affected |