CVE-2012-0021 — The log_cookie function in mod_log_config
The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a co
Published
2012-01-28T02:00:00.000Z
Last modified
2024-08-06T18:09:17.166Z
01What is this vulnerability?
The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.
02Affected products
| Vendor | Product | Versions |
|---|
| n | a / n/a | n/a |
03Active exploitation status
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
04Recommended remediation
- Patch to a fixed version listed in the vendor advisory (see references below).
- Mitigate with WAF rules, network egress filters, or feature flags where the patch is not yet available.
- Hunt historical logs for exploitation indicators — see Detection signatures below.
05Technical details
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
06Detection signatures
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
Open in Sigma generator →
07Related CVEs
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.
08Timeline
- Published: 2012-01-28T02:00:00.000Z
- Last modified: 2024-08-06T18:09:17.166Z
09References
- svn.apache.org — http://svn.apache.org/viewvc?view=revision&revision=1227292
- h20000.www2.hp.com — http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
- www.mandriva.com — http://www.mandriva.com/security/advisories?name=MDVSA-2012:012
- rhn.redhat.com — http://rhn.redhat.com/errata/RHSA-2012-0543.html
- marc.info — http://marc.info/?l=bugtraq&m=133294460209056&w=2
- issues.apache.org — https://issues.apache.org/bugzilla/show_bug.cgi?id=52256
- bugzilla.redhat.com — https://bugzilla.redhat.com/show_bug.cgi?id=785065
- marc.info — http://marc.info/?l=bugtraq&m=133294460209056&w=2
- rhn.redhat.com — http://rhn.redhat.com/errata/RHSA-2012-0542.html
- httpd.apache.org — http://httpd.apache.org/security/vulnerabilities_22.html
- lists.apple.com — http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
- support.apple.com — http://support.apple.com/kb/HT5501
- www.oracle.com — http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html
- h20000.www2.hp.com — http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
- marc.info — http://marc.info/?l=bugtraq&m=133494237717847&w=2
- www.mandriva.com — http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
- secunia.com — http://secunia.com/advisories/48551
- marc.info — http://marc.info/?l=bugtraq&m=133494237717847&w=2
- lists.apache.org — https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772…
- lists.apache.org — https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f74…
- lists.apache.org — https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d65…
- lists.apache.org — https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead8…
- lists.apache.org — https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90b…
- lists.apache.org — https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7…
- lists.apache.org — https://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b…
- lists.apache.org — https://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e…
- lists.apache.org — https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13…
- lists.apache.org — https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f45…
- lists.apache.org — https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f8…
- lists.apache.org — https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e…
Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →