5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.125 Low
EPSS
Percentile
94.9%
The Apache HTTP server is a powerful, full-featured, efficient, and
freely-available Web server.
An input filter bug in mod_ssl was discovered in Apache httpd version
2.0.50 and earlier. A remote attacker could force an SSL connection to be
aborted in a particular state and cause an Apache child process to enter an
infinite loop, consuming CPU resources. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-0748 to
this issue.
Additionally, this update includes the following enhancements and bug fixes:
included an improved version of the mod_cgi module that correctly handles
concurrent output on stderr and stdout
included support for direct lookup of SSL variables using %{SSL:…}
from mod_rewrite, or using %{…}s from mod_headers
restored support for use of SHA1-encoded passwords
added the mod_ext_filter module
Users of the Apache HTTP server should upgrade to these updated packages,
which contain backported patches that address these issues.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | any | ia64 | mod_ssl | < 2.0.46-38.ent | mod_ssl-2.0.46-38.ent.ia64.rpm |
RedHat | any | ia64 | httpd-devel | < 2.0.46-38.ent | httpd-devel-2.0.46-38.ent.ia64.rpm |
RedHat | any | ia64 | httpd | < 2.0.46-38.ent | httpd-2.0.46-38.ent.ia64.rpm |