Korean
<< Back
VID 22268
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The Apache web server, according to its banner, is vulnerable to a Denial of Service Vulnerability in the ap_get_mime_headers_core function.
The Apache, maintained by the Apache Software Foundation, is an extremely popular open-source Web server. In the versions of Apache 2.x which is older than 2.0.50, a remote attacker could cause a denial of service (memory exhaustion), caused by a flaw in the ap_get_mime_headers_core function in the protocol.c file. By sending a specially-crafted header lines with large numbers of space or tab characters, a remote attacker could consume an arbitrary amount of available memory and cause the server to crash. It may lead to heap based buffer overflow on 64 bit systems with more than 4GB virtual memory.

* Note: This check solely relied on the version number of the remote Apache server to assess this vulnerability, so this might be a false positive.

* References:
http://www.osvdb.org/displayvuln.php?osvdb_id=7269
http://www.guninski.com/httpd1.html

* Platforms Affected:
Apache HTTP Server 2.0.x versions older than 2.0.50.
Any operating system Any version
Recommendation Upgrade to the latest version of Apache HTTP Server (2.0.50 or later), available from the Apache Software Foundation download site at http://httpd.apache.org/download.cgi

-- OR --

For Apache HTTP Server 2.0.47, 2.0.48, 2.0.49:
Apply the Unofficial patch supported by Apache Software Foundation for this issue, available from the site at http://www.apache.org/dist/httpd/patches/apply_to_2.0.49/CAN-2004-0493.patch
Related URL CVE-2004-0493 (CVE)
Related URL (SecurityFocus)
Related URL 16524 (ISS)