The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.
https://issues.apache.org/bugzilla/show_bug.cgi?id=52256
https://bugzilla.redhat.com/show_bug.cgi?id=785065
http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
http://www.mandriva.com/security/advisories?name=MDVSA-2012:012
http://svn.apache.org/viewvc?view=revision&revision=1227292
http://support.apple.com/kb/HT5501
http://secunia.com/advisories/48551
http://rhn.redhat.com/errata/RHSA-2012-0543.html
http://rhn.redhat.com/errata/RHSA-2012-0542.html
http://marc.info/?l=bugtraq&m=133494237717847&w=2
http://marc.info/?l=bugtraq&m=133294460209056&w=2
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
http://httpd.apache.org/security/vulnerabilities_22.html
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041