CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
98.2%
Apache HTTP Server is prone to a denial of service (DoS) vulnerability.
# SPDX-FileCopyrightText: 2021 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if (description)
{
script_oid("1.3.6.1.4.1.25623.1.0.107963");
script_version("2024-02-15T05:05:40+0000");
script_tag(name:"last_modification", value:"2024-02-15 05:05:40 +0000 (Thu, 15 Feb 2024)");
script_tag(name:"creation_date", value:"2021-02-02 12:07:31 +0100 (Tue, 02 Feb 2021)");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_cve_id("CVE-2002-0392");
script_tag(name:"qod_type", value:"remote_banner_unreliable");
script_tag(name:"solution_type", value:"VendorFix");
script_name("Apache HTTP Server 1.2.2 - 1.3.24 / 2.0 - 2.0.36 DoS Vulnerability - Linux");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2021 Greenbone AG");
script_family("Web Servers");
script_dependencies("gb_apache_http_server_consolidation.nasl", "os_detection.nasl");
script_mandatory_keys("apache/http_server/detected", "Host/runs_unixoide");
script_tag(name:"summary", value:"Apache HTTP Server is prone to a denial of service (DoS) vulnerability.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"There is a remotely exploitable vulnerability in the way that Apache
web servers (or other web servers based on their source code) handle data encoded in chunks. This
vulnerability is present by default in configurations of Apache web server. The impact of this
vulnerability is dependent upon the software version and the hardware platform the server is running on.");
script_tag(name:"impact", value:"For Apache versions 1.2.2 through 1.3.24 inclusive, this vulnerability
may allow the execution of arbitrary code by remote attackers. Exploits are publicly available that claim
to allow the execution of arbitrary code.
For Apache versions 2.0 through 2.0.36 inclusive, the condition causing the vulnerability is correctly
detected and causes the child process to exit. Depending on a variety of factors, including the threading
model supported by the vulnerable system, this may lead to a denial-of-service attack against the Apache
web server.");
script_tag(name:"affected", value:"Apache HTTP Server version 1.2.2 and above, 1.3 through 1.3.24, and versions
2.0 through 2.0.36.");
script_tag(name:"solution", value:"Update to version 1.3.26, 2.0.39 or later.");
script_xref(name:"URL", value:"https://www.kb.cert.org/vuls/id/944335");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
CPE = "cpe:/a:apache:http_server";
if( isnull( port = get_app_port( cpe:CPE ) ) )
exit( 0 );
if( ! infos = get_app_version_and_location( cpe:CPE, port:port, exit_no_version:TRUE, version_regex:"^[0-9]+\.[0-9]+\.[0-9]+" ) )
exit( 0 );
version = infos["version"];
location = infos["location"];
if( version_in_range( version:version, test_version:"1.2.2", test_version2:"1.3.24" ) ) {
report = report_fixed_ver( installed_version:version, fixed_version:"1.3.26", install_path:location );
security_message( port:port, data:report );
exit( 0 );
}
if( version_in_range( version:version, test_version:"2.0", test_version2:"2.0.36" ) ) {
report = report_fixed_ver(installed_version:version, fixed_version:"2.0.39", install_path:location );
security_message( port:port, data:report );
exit( 0 );
}
exit( 99 );