Lucene search

K
openvasCopyright (C) 2004 David MaciejakOPENVAS:136141256231012293
HistoryNov 03, 2005 - 12:00 a.m.

Apache HTTP Server Input Header Folding and mod_ssl ssl_io_filter_cleanup DoS Vulnerabilities

2005-11-0300:00:00
Copyright (C) 2004 David Maciejak
plugins.openvas.org
17

6.3 Medium

AI Score

Confidence

Low

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.962 High

EPSS

Percentile

99.5%

The remote host appears to be running a version of Apache
HTTP Server 2.x which is older than 2.0.50.

# SPDX-FileCopyrightText: 2004 David Maciejak
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:apache:http_server";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.12293");
  script_version("2023-08-01T13:29:10+0000");
  script_tag(name:"last_modification", value:"2023-08-01 13:29:10 +0000 (Tue, 01 Aug 2023)");
  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:P/A:P");
  script_cve_id("CVE-2004-0493");
  script_xref(name:"OSVDB", value:"7269");
  script_name("Apache HTTP Server Input Header Folding and mod_ssl ssl_io_filter_cleanup DoS Vulnerabilities");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2004 David Maciejak");
  script_family("Denial of Service");
  script_dependencies("gb_apache_http_server_consolidation.nasl");
  script_require_ports("Services/www", 80);
  script_mandatory_keys("apache/http_server/http/detected");

  script_xref(name:"URL", value:"http://www.guninski.com/httpd1.html");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/10619");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/12877");

  script_tag(name:"summary", value:"The remote host appears to be running a version of Apache
  HTTP Server 2.x which is older than 2.0.50.");

  script_tag(name:"insight", value:"There is denial of service in apache httpd 2.0.x by sending a
  specially crafted HTTP request. It is possible to consume arbitrary
  amount of memory. On 64 bit systems with more than 4GB virtual memory
  this may lead to heap based buffer overflow.

  There is also a denial of service vulnerability in mod_ssl's
  ssl_io_filter_cleanup function. By sending a request to vulnerable
  server over SSL and closing the connection before the server can send
  a response, an attacker can cause a memory violation that crashes the
  server.");

  script_tag(name:"solution", value:"Update to Apache HTTP Server 2.0.50 or later.");

  script_tag(name:"qod_type", value:"remote_banner_unreliable");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("http_func.inc");
include("host_details.inc");

if( ! port = get_app_port( cpe:CPE, service:"www" ) )
  exit( 0 );

if( ! get_app_location( cpe:CPE, port:port, nofork:TRUE ) )
  exit( 0 );

banner = http_get_remote_headers( port:port );
if( ! banner )
  exit( 0 );

if( egrep( pattern:"^Server:.*Apache(-AdvancedExtranetServer)?/2\.0\.(([0-9][^0-9])([0-3][0-9][^0-9])|(4[0-9][^0-9])).*", string:banner ) ) {
  security_message( port:port );
  exit( 0 );
}

exit( 99 );

6.3 Medium

AI Score

Confidence

Low

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.962 High

EPSS

Percentile

99.5%