ID CVE-2005-1268
Summary Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote attackers to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 19-10-2018 - 15:31)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:N/A:P
oval via4
  • accepted 2006-01-25T07:30:00.000-04:00
    class vulnerability
    contributors
    name Robert L. Hollis
    organization ThreatGuard, Inc.
    description Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote attackers to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte.
    family unix
    id oval:org.mitre.oval:def:1346
    status accepted
    submitted 2005-11-30T12:00:00.000-04:00
    title Apache mod_ssl CRL off-by-one DoS
    version 32
  • accepted 2007-10-02T08:08:10.523-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Todd Dolinsky
      organization Opsware, Inc.
    description Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote attackers to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte.
    family unix
    id oval:org.mitre.oval:def:1714
    status accepted
    submitted 2006-03-18T07:24:00.000-04:00
    title VirusVault Off-by-One Error in mod_ssl CRL
    version 31
  • accepted 2007-10-02T08:08:10.805-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Todd Dolinsky
      organization Opsware, Inc.
    description Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote attackers to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte.
    family unix
    id oval:org.mitre.oval:def:1747
    status accepted
    submitted 2006-03-18T07:24:00.000-04:00
    title Webproxy Off-by-One Error in mod_ssl CRL
    version 31
  • accepted 2013-04-29T04:20:28.525-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    • comment The operating system installed on the system is Red Hat Enterprise Linux 4
      oval oval:org.mitre.oval:def:11831
    • comment CentOS Linux 4.x
      oval oval:org.mitre.oval:def:16636
    • comment Oracle Linux 4.x
      oval oval:org.mitre.oval:def:15990
    description Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote attackers to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte.
    family unix
    id oval:org.mitre.oval:def:9589
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote attackers to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte.
    version 23
redhat via4
advisories
rhsa
id RHSA-2005:582
refmap via4
bid 14366
confirm http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
debian DSA-805
hp
  • HPSBUX02074
  • SSRT051251
mandrake MDKSA-2005:129
misc https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=163013
secunia
  • 19072
  • 19185
sreason 604
sunalert 102198
suse
  • SUSE-SA:2005:046
  • SUSE-SR:2005:018
trustix TSLSA-2005-0059
vupen ADV-2006-0789
statements via4
contributor Mark J Cox
lastmodified 2008-07-02
organization Apache
statement Fixed in Apache HTTP Server 2.0.55: http://httpd.apache.org/security/vulnerabilities_20.html
Last major update 19-10-2018 - 15:31
Published 05-08-2005 - 04:00
Back to Top