ID CVE-2004-0942
Summary Apache webserver 2.0.52 and earlier allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request with a MIME header containing multiple lines with a large number of space characters.
References
Vulnerable Configurations
  • Apache Software Foundation Apache HTTP Server 2.0.52
    cpe:2.3:a:apache:http_server:2.0.52
CVSS
Base: 5.0 (as of 01-01-2004 - 00:00)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
exploit-db via4
description Apache <= 2.0.52 HTTP GET request Denial of Service Exploit. CVE-2004-0942. Dos exploits for multiple platform
id EDB-ID:855
last seen 2016-01-31
modified 2005-03-04
published 2005-03-04
reporter GreenwooD
source https://www.exploit-db.com/download/855/
title Apache <= 2.0.52 HTTP GET request Denial of Service Exploit
nessus via4
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_APACHE2_2052_2.NASL
    description The following package needs to be updated: apache
    last seen 2016-09-26
    modified 2004-11-23
    plugin id 15796
    published 2004-11-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=15796
    title FreeBSD : apache2 multiple space header denial-of-service vulnerability (9)
  • NASL family HP-UX Local Security Checks
    NASL id HPUX_PHSS_33075.NASL
    description s700_800 11.04 Virtualvault 4.7 OWS (Apache 2.x) update : A potential security vulnerability has been identified with Apache running on HP-UX where the vulnerability could be exploited remotely to create a Denial of Service (DoS) or to bypass SSLCipherSuite restrictions.
    last seen 2019-02-21
    modified 2013-04-20
    plugin id 19399
    published 2005-08-08
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19399
    title HP-UX PHSS_33075 : Apache on HP-UX, Remote Denial of Service (DoS), Bypass of SSLCipherSuite Settings (HPSBUX01123 SSRT5931 rev.2)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-23-1.NASL
    description Chintan Trivedi discovered a Denial of Service vulnerability in apache2. The field length limit was not enforced for certain malicious requests. This could allow a remote attacker who is able to send large amounts of data to a server to cause HTTP server instances to consume proportional amounts of memory, which can render the service unavailable. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-07-19
    plugin id 20638
    published 2006-01-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=20638
    title Ubuntu 4.10 : apache2 vulnerability (USN-23-1)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2004-135.NASL
    description A vulnerability in apache 2.0.35-2.0.52 was discovered by Chintan Trivedi; he found that by sending a large amount of specially- crafted HTTP GET requests, a remote attacker could cause a Denial of Service on the httpd server. This vulnerability is due to improper enforcement of the field length limit in the header-parsing code. The updated packages have been patched to prevent this problem.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 15740
    published 2004-11-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=15740
    title Mandrake Linux Security Advisory : apache2 (MDKSA-2004:135)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-200411-18.NASL
    description The remote host is affected by the vulnerability described in GLSA-200411-18 (Apache 2.0: Denial of Service by memory consumption) Chintan Trivedi discovered a vulnerability in Apache httpd 2.0 that is caused by improper enforcing of the field length limit in the header-parsing code. Impact : By sending a large amount of specially crafted HTTP GET requests a remote attacker could cause a Denial of Service of the targeted system. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-08-10
    plugin id 15693
    published 2004-11-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=15693
    title GLSA-200411-18 : Apache 2.0: Denial of Service by memory consumption
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_282DFEA0337811D9B404000C6E8F12EF.NASL
    description It is possible for remote attackers to cause a denial-of-service scenario on Apache 2.0.52 and earlier by sending an HTTP GET request with a MIME header containing multiple lines full of whitespaces.
    last seen 2019-02-21
    modified 2018-11-21
    plugin id 37058
    published 2009-04-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=37058
    title FreeBSD : apache2 multiple space header denial-of-service vulnerability (282dfea0-3378-11d9-b404-000c6e8f12ef)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2004-562.NASL
    description Updated httpd packages that include fixes for two security issues, as well as other bugs, are now available. The Apache HTTP server is a powerful, full-featured, efficient, and freely-available Web server. An issue has been discovered in the mod_ssl module when configured to use the 'SSLCipherSuite' directive in directory or location context. If a particular location context has been configured to require a specific set of cipher suites, then a client will be able to access that location using any cipher suite allowed by the virtual host configuration. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0885 to this issue. An issue has been discovered in the handling of white space in request header lines using MIME folding. A malicious client could send a carefully crafted request, forcing the server to consume large amounts of memory, leading to a denial of service. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0942 to this issue. Several minor bugs were also discovered, including : - In the mod_cgi module, problems that arise when CGI scripts are invoked from SSI pages by mod_include using the '#include virtual' syntax have been fixed. - In the mod_dav_fs module, problems with the handling of indirect locks on the S/390x platform have been fixed. Users of the Apache HTTP server who are affected by these issues should upgrade to these updated packages, which contain backported patches.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 15700
    published 2004-11-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=15700
    title RHEL 3 : httpd (RHSA-2004:562)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_SECUPD2005-007.NASL
    description The remote host is running a version of Mac OS X 10.4 or 10.3 that does not have Security Update 2005-007 applied. This security update contains fixes for the following products : - Apache 2 - AppKit - Bluetooth - CoreFoundation - CUPS - Directory Services - HItoolbox - Kerberos - loginwindow - Mail - MySQL - OpenSSL - QuartzComposerScreenSaver - ping - Safari - SecurityInterface - servermgrd - servermgr_ipfilter - SquirelMail - traceroute - WebKit - WebLog Server - X11 - zlib
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 19463
    published 2005-08-18
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19463
    title Mac OS X Multiple Vulnerabilities (Security Update 2005-007)
oval via4
accepted 2013-04-29T04:10:17.950-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 3
    oval oval:org.mitre.oval:def:11782
  • comment CentOS Linux 3.x
    oval oval:org.mitre.oval:def:16651
description Apache webserver 2.0.52 and earlier allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request with a MIME header containing multiple lines with a large number of space characters.
family unix
id oval:org.mitre.oval:def:10962
status accepted
submitted 2010-07-09T03:56:16-04:00
title Apache webserver 2.0.52 and earlier allows remote attackers to cause a denial of service (CPU consumption) via an HTTP GET request with a MIME header containing multiple lines with a large number of space characters.
version 23
packetstorm via4
data source https://packetstormsecurity.com/files/download/35097/slmail5x.txt
id PACKETSTORM:35097
last seen 2016-12-05
published 2004-11-20
reporter muts
source https://packetstormsecurity.com/files/35097/slmail5x.txt.html
title slmail5x.txt
redhat via4
advisories
rhsa
id RHSA-2004:562
refmap via4
apple
  • APPLE-SA-2005-08-15
  • APPLE-SA-2005-08-17
confirm http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
fulldisc 20041101 DoS in Apache 2.0.52 ?
hp
  • HPSBUX01123
  • SSRT4876
mandrake MDKSA-2004:135
secunia 19072
sunalert 102198
trustix 2004-0061
vupen ADV-2006-0789
xf apache-http-get-dos(17930)
statements via4
contributor Mark J Cox
lastmodified 2008-07-02
organization Apache
statement Fixed in Apache HTTP Server 2.0.53: http://httpd.apache.org/security/vulnerabilities_20.html
Last major update 17-10-2016 - 22:50
Published 09-02-2005 - 00:00
Last modified 10-10-2017 - 21:29
Back to Top