| VID |
22268 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
The Apache web server, according to its banner, is vulnerable to a Denial of Service Vulnerability in the ap_get_mime_headers_core function. The Apache, maintained by the Apache Software Foundation, is an extremely popular open-source Web server. In the versions of Apache 2.x which is older than 2.0.50, a remote attacker could cause a denial of service (memory exhaustion), caused by a flaw in the ap_get_mime_headers_core function in the protocol.c file. By sending a specially-crafted header lines with large numbers of space or tab characters, a remote attacker could consume an arbitrary amount of available memory and cause the server to crash. It may lead to heap based buffer overflow on 64 bit systems with more than 4GB virtual memory.
* Note: This check solely relied on the version number of the remote Apache server to assess this vulnerability, so this might be a false positive.
* References: http://www.osvdb.org/displayvuln.php?osvdb_id=7269 http://www.guninski.com/httpd1.html
* Platforms Affected: Apache HTTP Server 2.0.x versions older than 2.0.50. Any operating system Any version |
| Recommendation |
Upgrade to the latest version of Apache HTTP Server (2.0.50 or later), available from the Apache Software Foundation download site at http://httpd.apache.org/download.cgi
-- OR --
For Apache HTTP Server 2.0.47, 2.0.48, 2.0.49: Apply the Unofficial patch supported by Apache Software Foundation for this issue, available from the site at http://www.apache.org/dist/httpd/patches/apply_to_2.0.49/CAN-2004-0493.patch |
| Related URL |
CVE-2004-0493 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
16524 (ISS) |
|