Korean
<< Back
VID 22266
Severity 20
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The Apache web server, according to its banner, is vulnerable to a Blocking Denial of Service Vulnerability.
The Apache, maintained by the Apache Software Foundation, is an extremely popular open-source Web server. When using multiple listening sockets, the version prior to 2.0.49 of Apache HTTP Server would cause a Denial of Service (blocked new connections), caused by improper handling of short-lived connections on some platforms. By establishing a connection, for a short period of time, to a listening socket that is rarely accessed, a remote attacker could cause the server to deny new connection requests until another connection is established on the socket.

* Note: This check solely relied on the version number of the remote Apache server to assess this vulnerability, so this might be a false positive.

* References:
http://marc.theaimsgroup.com/?l=bugtraq&m=107973894328806&w=2
http://www.kb.cert.org/vuls/id/132110
http://packetstormsecurity.nl/0403-advisories/apache2049.txt

* Platforms Affected:
Apache HTTP Server version 1.x prior to 1.3.31
Apache HTTP Server version 2.x prior to 2.0.49
Windows Any version
UNIX/Linux Any version
Recommendation Upgrade to the latest version of Apache HTTP Server (2.0.49 or later, 1.3.31 or later), available from the Apache Software Foundation download site at http://httpd.apache.org/download.cgi

For other distributions:
Contact your vendor for upgrade or patch information. Or see the "Solution" menu of the SecurityFocus Vulnerabilities Bulletin at http://www.securityfocus.com/bid/9921/solution/
Related URL CVE-2004-0174 (CVE)
Related URL 9921 (SecurityFocus)
Related URL 15540 (ISS)