Versio.io

CVE-2014-3581

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 08-09-2014 02:00
Last modified: - 08-09-2014 02:00
Total changes: - 18

Description

CVE-2014-3581 httpd: NULL pointer dereference in mod_cache if Content-Type has empty value

Common Vulnerability Scoring System (CVSS)

AV:N/AC:H/Au:N/C:N/I:N/A:P
High
Attack complexity
Network
Attack vector
Low
Availability
None
Confidentiality
None
Integrity
-
Privileges required
-
Scope
-
User interaction
2.6
Base score
Exploitability score
Impact score
 

Verification logic

OR
AND
product=httpd-0 AND versionEndExcluding=2.4.6-31.el7
vendor=Red Hat Enterprise Linux AND product=enterprise_linux AND version=7
AND
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_web_server AND version=3.0
AND
product=apache-commons-collections-eap6-0 AND versionEndExcluding=3.2.1-18.redhat_7.1.ep6.el6
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_web_server AND version=3.0
AND
product=httpd24-0 AND versionEndExcluding=2.4.6-59.ep7.el6
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_web_server AND version=3.0
AND
product=mod_bmx-0 AND versionEndExcluding=0.9.5-7.GA.ep7.el6
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_web_server AND version=3.0
AND
product=mod_cluster-native-0 AND versionEndExcluding=1.3.1-6.Final_redhat_2.ep7.el6
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_web_server AND version=3.0
AND
product=Tomcat AND versionEndExcluding=7.0.59-42_patch_01.ep7.el6
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_web_server AND version=3.0
AND
product=Tomcat AND versionEndExcluding=8.0.18-52_patch_01.ep7.el6
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_web_server AND version=3.0
AND
product=tomcat-vault-0 AND versionEndExcluding=1.0.8-4.Final_redhat_4.1.ep7.el6
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_web_server AND version=3.0
AND
product=apache-commons-collections-eap6-0 AND versionEndExcluding=3.2.1-18.redhat_7.1.ep6.el7
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_web_server AND version=3.0
AND
product=httpd24-0 AND versionEndExcluding=2.4.6-59.ep7.el7
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_web_server AND version=3.0
AND
product=mod_bmx-0 AND versionEndExcluding=0.9.5-7.GA.ep7.el7
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_web_server AND version=3.0
AND
product=mod_cluster-native-0 AND versionEndExcluding=1.3.1-6.Final_redhat_2.ep7.el7
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_web_server AND version=3.0
AND
product=Tomcat AND versionEndExcluding=7.0.59-42_patch_01.ep7.el7
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_web_server AND version=3.0
AND
product=Tomcat AND versionEndExcluding=8.0.18-52_patch_01.ep7.el7
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_web_server AND version=3.0
AND
product=tomcat-vault-0 AND versionEndExcluding=1.0.8-4.Final_redhat_4.1.ep7.el7
vendor=Red Hat Enterprise Linux AND product=jboss_enterprise_web_server AND version=3.0
AND
product=httpd24-httpd-0 AND versionEndExcluding=2.4.6-22.el6
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=1
AND
product=httpd24-httpd-0 AND versionEndExcluding=2.4.6-22.el6
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=1
AND
product=httpd24-httpd-0 AND versionEndExcluding=2.4.6-22.el6
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=1
AND
product=httpd24-httpd-0 AND versionEndExcluding=2.4.6-22.el6
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=1
AND
product=httpd24-httpd-0 AND versionEndExcluding=2.4.6-25.el7
vendor=Red Hat Enterprise Linux AND product=rhel_software_collections AND version=1
 

Reference

 


Keywords

REDHAT

 

CVE-2014-3581

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.