Lucene search

K
kasperskyKaspersky LabKLA10065
HistoryJul 22, 2013 - 12:00 a.m.

KLA10065 Multiple vulnerabilities in Apache httpd

2013-07-2200:00:00
Kaspersky Lab
threats.kaspersky.com
115

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

AI Score

9.2

Confidence

High

EPSS

0.974

Percentile

99.9%

Multiple serious vulnerabilities have been found in Apache httpd. Malicious users can exploit these vulnerabilities to gain privileges, cause denial of service, execute arbitrary code, obtain sensitive information or bypass security restrictions. Below is a complete list of vulnerabilities

  1. An integer overflow vulnerability can be exploited locally via a specially designed HTTP request & htaccess file;
  2. A stack consumption vulnerability can be exploited via a specially designed fnmatch call;
  3. Vectors related to the scoreboard can be exploited via modifying memory segments;
  4. A nonsecure write vulnerability can be exploited remotely via a specially designed HTTP request;
  5. An improper restriction vulnerability can be exploited remotely via specially designed header & web scripts ;
  6. Vectors related to mod_proxy can be exploited remotely via a specially formed URI;
  7. Vectors related to byterange filter can be exploited remotely via specially formed headers.

Original advisories

Apache changelog

Exploitation

The following public exploits exists for this vulnerability:

https://www.exploit-db.com/exploits/17696

https://www.exploit-db.com/exploits/17969

Related products

Apache-HTTP-Server

CVE list

CVE-2011-3192 critical

CVE-2013-1862 high

CVE-2012-0031 warning

CVE-2011-0419 warning

CVE-2011-3607 warning

CVE-2011-3368 critical

CVE-2012-0053 warning

Solution

Update to latest version

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

Affected Products

  • Apache httpd 2.0 versions 2.0.64 and earlier

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

AI Score

9.2

Confidence

High

EPSS

0.974

Percentile

99.9%