SHARE
Facebook X Pinterest WhatsApp

Open Source Apache and Nginx Web Servers Get More Secure

Mar 20, 2014
ServerWatch content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More



Two of the world’s most widely deployed web servers have both recently been updated to fix security vulnerabilities.

The open-source Apache HTTP Server is being updated to version 2.4.9 to fix two separate security issues, both of which carry the highest possible exploitability score Apache Web Server from the National Vulnerability Database. The first issue is identified as CVE-2014-0098 and is an issue that could potentially lead to a Denial of Service (DoS) condition.

“The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation,” the vulnerability summary for CVE-2014-0098 states.

The fix for the flaw from Apache is to clean up the cookie logging parser so that it no longer recognizes valueless cookies.

The other security flaw fixed in Apache HTTP Server 2.4.9, identified as CVE-2013-6438, could enable a DoS condition by way of a malicious DAV WRITE request.

The Apache 2.4.9 release isn’t just about security fixes, though; it also promises a number of incremental features updates. One of the updates is greater control over Apache’s RewriteRules. There is also support in the mod_socache_shmcb module for larger memory sizes.

The mod_lua language module gets a small bug fix to improve reliability. Mod_ssl also gets a fix for a bug that could have triggered a crash when used with older versions of the OpenSSL cryptographic system.

The Apache 2.4.x branch first debuted back in February of 2012 and is currently the leading edge of the Apache HTTP Web Server stable release family.

nginx

While Apache still dominates the web server landscape, in recent years the open-source nginx web server has emerged as a serious challenger.

This week nginx also received an update for security-related issues. Both the nginx 1.5.12 and nginx 1.4.7 releases debuted this week to fix a SPDY heap buffer overflow issue identified as CVE-2014-0133.

“A bug in the experimental SPDY implementation in nginx was found, which might allow an attacker to cause a heap memory buffer overflow in a worker process by using a specially crafted request, potentially resulting in arbitrary code execution,” Maxim Dounin wrote in an nginx mailing list posting.


Sean Michael Kerner is a senior editor at ServerWatch and InternetNews.com. Follow him on Twitter @TechJournalist.

Follow ServerWatch on Twitter and on Facebook

thumbnail Sean Michael Kerner

Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.

Recommended for you...

Data Center Survey 2021: Outages Less Common, More Expensive
Sam Ingalls
Sep 21, 2021
On-Prem Infrastructure is Here to Stay. But What Workloads Go Where?
Sam Ingalls
Jul 3, 2021
IBM’s 2nm Breakthrough: Implications for Chip and Server Makers
Sam Ingalls
Jun 4, 2021
A Tale of Two 3rd Gen Processors: AMD & Intel
Sam Ingalls
May 20, 2021
ServerWatch Logo

ServerWatch is a top resource on servers. Explore the latest news, reviews and guides for server administrators now.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.