Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.11507
Category:Misc.
Title:Apache < 2.0.45
Summary:NOSUMMARY
Description:Description:

The remote host appears to be running a version of
Apache 2.x which is older than 2.0.45

This version is vulnerable to various flaws :

- There is a denial of service attack which may allow
an attacker to disable this server remotely

- The httpd process leaks file descriptors to child processes,
such as CGI scripts. An attacker who has the ability to execute
arbitrary CGI scripts on this server (including PHP code) would
be able to write arbitrary data in the file pointed to (in particular,
the log files)

Solution : Upgrade to version 2.0.45
See also : http://www.apache.org/dist/httpd/CHANGES_2.0
Risk factor : High

Cross-Ref: BugTraq ID: 7254
BugTraq ID: 7255
Common Vulnerability Exposure (CVE) ID: CVE-2003-0132
Bugtraq: 20030402 [ANNOUNCE] Apache 2.0.45 Released (Google Search)
http://marc.info/?l=bugtraq&m=104931360606484&w=2
Bugtraq: 20030408 Exploit Code Released for Apache 2.x Memory Leak (Google Search)
http://marc.info/?l=bugtraq&m=104994309010974&w=2
Bugtraq: 20030408 iDEFENSE Security Advisory 04.08.03: Denial of Service in Apache HTTP Server 2.x (Google Search)
http://marc.info/?l=bugtraq&m=104982175321731&w=2
Bugtraq: 20030409 GLSA: apache (200304-01) (Google Search)
http://marc.info/?l=bugtraq&m=104994239010517&w=2
Bugtraq: 20030410 working apache <= 2.0.44 DoS exploit for linux. (Google Search)
http://marc.info/?l=bugtraq&m=105001663120995&w=2
Bugtraq: 20030411 PATCH: [CAN-2003-0132] Apache 2.0.44 Denial of Service (Google Search)
http://marc.info/?l=bugtraq&m=105013378320711&w=2
CERT/CC vulnerability note: VU#206537
http://www.kb.cert.org/vuls/id/206537
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=205147
http://www.idefense.com/advisory/04.08.03.txt
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6@%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A156
http://www.redhat.com/support/errata/RHSA-2003-139.html
http://secunia.com/advisories/34920
http://secunia.com/advisories/8499
http://www.vupen.com/english/advisories/2009/1233
CopyrightThis script is Copyright (C) 2003 Renaud Deraison

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.