ID CVE-2009-3094
Summary The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command. Per: http://cwe.mitre.org/data/definitions/476.html 'CWE-476: NULL Pointer Dereference'
References
Vulnerable Configurations
  • cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
    cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
CVSS
Base: 2.6 (as of 10-10-2018 - 19:43)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE PARTIAL
cvss-vector via4 AV:N/AC:H/Au:N/C:N/I:N/A:P
oval via4
  • accepted 2013-04-29T04:10:26.972-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    • comment The operating system installed on the system is Red Hat Enterprise Linux 4
      oval oval:org.mitre.oval:def:11831
    • comment CentOS Linux 4.x
      oval oval:org.mitre.oval:def:16636
    • comment Oracle Linux 4.x
      oval oval:org.mitre.oval:def:15990
    • comment The operating system installed on the system is Red Hat Enterprise Linux 5
      oval oval:org.mitre.oval:def:11414
    • comment The operating system installed on the system is CentOS Linux 5.x
      oval oval:org.mitre.oval:def:15802
    • comment Oracle Linux 5.x
      oval oval:org.mitre.oval:def:15459
    description The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
    family unix
    id oval:org.mitre.oval:def:10981
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
    version 24
  • accepted 2014-07-14T04:01:28.723-04:00
    class vulnerability
    contributors
    • name J. Daniel Brown
      organization DTCC
    • name Mike Lah
      organization The MITRE Corporation
    • name Mike Lah
      organization The MITRE Corporation
    • name Shane Shaffer
      organization G2, Inc.
    • name Maria Mikhno
      organization ALTX-SOFT
    definition_extensions
    • comment Apache HTTP Server 2.0.x is installed on the system
      oval oval:org.mitre.oval:def:8605
    • comment Apache HTTP Server 2.2.x is installed on the system
      oval oval:org.mitre.oval:def:8550
    description The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
    family windows
    id oval:org.mitre.oval:def:8087
    status accepted
    submitted 2010-03-08T17:30:00.000-05:00
    title Apache mod_proxy_ftp Module Insufficient Input Validation Denial Of Service Vulnerability
    version 12
redhat via4
rpms
  • httpd-0:2.0.46-77.ent
  • httpd-devel-0:2.0.46-77.ent
  • mod_ssl-0:2.0.46-77.ent
  • httpd-0:2.2.3-31.el5_4.2
  • httpd-devel-0:2.2.3-31.el5_4.2
  • httpd-manual-0:2.2.3-31.el5_4.2
  • mod_ssl-0:2.2.3-31.el5_4.2
  • httpd-0:2.0.52-41.ent.6
  • httpd-devel-0:2.0.52-41.ent.6
  • httpd-manual-0:2.0.52-41.ent.6
  • httpd-suexec-0:2.0.52-41.ent.6
  • mod_ssl-0:2.0.52-41.ent.6
refmap via4
aixapar
  • PK96858
  • PM09161
bugtraq 20091124 rPSA-2009-0155-1 httpd mod_ssl
confirm
debian DSA-1934
fedora
  • FEDORA-2009-12604
  • FEDORA-2009-12606
hp
  • HPSBMU02753
  • HPSBOV02506
  • HPSBUX02531
  • SSRT090244
  • SSRT100108
  • SSRT100782
misc
secunia
  • 36549
  • 37152
suse SUSE-SA:2009:050
vupen ADV-2010-0609
statements via4
contributor Tomas Hoger
lastmodified 2009-11-12
organization Red Hat
statement List of the errata fixing this flaw in affected products can be found at: https://www.redhat.com/security/data/cve/CVE-2009-3094.html
Last major update 10-10-2018 - 19:43
Published 08-09-2009 - 18:30
Back to Top