CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
79.0%
PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.
Vendor | Product | Version | CPE |
---|---|---|---|
apache | mod_perl | * | cpe:2.3:a:apache:mod_perl:*:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 6.06 | cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 6.10 | cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:* |
canonical | ubuntu_linux | 7.04 | cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:* |
redhat | satellite | 5.1 | cpe:2.3:a:redhat:satellite:5.1:*:*:*:*:*:*:* |
redhat | enterprise_linux_desktop | 3.0 | cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_desktop | 4.0 | cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_desktop | 5.0 | cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_eus | 4.5 | cpe:2.3:o:redhat:enterprise_linux_eus:4.5:*:*:*:*:*:*:* |
redhat | enterprise_linux_server | 3.0 | cpe:2.3:o:redhat:enterprise_linux_server:3.0:*:*:*:*:*:*:* |
ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
rhn.redhat.com/errata/RHSA-2007-0395.html
rhn.redhat.com/errata/RHSA-2008-0630.html
secunia.com/advisories/24678
secunia.com/advisories/24839
secunia.com/advisories/25072
secunia.com/advisories/25110
secunia.com/advisories/25432
secunia.com/advisories/25655
secunia.com/advisories/25730
secunia.com/advisories/25894
secunia.com/advisories/26084
secunia.com/advisories/26231
secunia.com/advisories/26290
secunia.com/advisories/31490
secunia.com/advisories/31493
secunia.com/advisories/33720
secunia.com/advisories/33723
security.gentoo.org/glsa/glsa-200705-04.xml
sunsolve.sun.com/search/document.do?assetkey=1-66-248386-1
sunsolve.sun.com/search/document.do?assetkey=1-77-1021508.1-1
support.avaya.com/elmodocs2/security/ASA-2007-293.htm
svn.apache.org/repos/asf/perl/modperl/branches/1.x/Changes
www.gossamer-threads.com/lists/modperl/modperl/92739
www.mandriva.com/security/advisories?name=MDKSA-2007:083
www.novell.com/linux/security/advisories/2007_12_sr.html
www.novell.com/linux/security/advisories/2007_8_sr.html
www.redhat.com/support/errata/RHSA-2007-0396.html
www.redhat.com/support/errata/RHSA-2007-0486.html
www.redhat.com/support/errata/RHSA-2008-0261.html
www.redhat.com/support/errata/RHSA-2008-0627.html
www.securityfocus.com/bid/23192
www.securitytracker.com/id?1018259
www.trustix.org/errata/2007/0023/
www.ubuntu.com/usn/usn-488-1
www.vupen.com/english/advisories/2007/1150
exchange.xforce.ibmcloud.com/vulnerabilities/33312
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10987
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8349