### [CVE-2012-0021](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0021) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value. ### POC #### Reference - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html #### Github - https://github.com/8ctorres/SIND-Practicas - https://github.com/syadg123/pigat - https://github.com/teamssix/pigat