// For flags

CVE-2004-0493

Apache - Arbitrary Long HTTP Headers Denial of Service

Severity Score

6.4
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

3
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The ap_get_mime_headers_core function in Apache httpd 2.0.49 allows remote attackers to cause a denial of service (memory exhaustion), and possibly an integer signedness error leading to a heap-based buffer overflow on 64 bit systems, via long header lines with large numbers of space or tab characters.

La función ap_get_mime_headers_core de Apache httpd 2.0.49 permite a atacantes remotos causar una denegación de servicio (consumición de memoria) y posiblemente un error de entero sin signo que conduce a un desbordamiento de búfer basado en el montón en en sistemas de 64 bits, mediante líneas de cabecera largas con muchos caractéres espacio o tabulador.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2004-05-27 CVE Reserved
  • 2004-06-30 CVE Published
  • 2004-07-22 First Exploit
  • 2024-01-06 EPSS Updated
  • 2024-08-08 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
References (28)
URL Tag Source
http://lists.grok.org.uk/pipermail/full-disclosure/2004-June/023133.html Mailing List
http://marc.info/?l=bugtraq&m=108853066800184&w=2 Mailing List
http://www.apacheweek.com/features/security-20 X_refsource_confirm
http://www.guninski.com/httpd1.html X_refsource_misc
https://exchange.xforce.ibmcloud.com/vulnerabilities/16524 Vdb Entry
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E Mailing List
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10605 Signature
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Avaya
Search vendor "Avaya"
Converged Communications Server
Search vendor "Avaya" for product "Converged Communications Server"
2.0
Search vendor "Avaya" for product "Converged Communications Server" and version "2.0"
-
Affected
Gentoo
Search vendor "Gentoo"
Linux
Search vendor "Gentoo" for product "Linux"
1.4
Search vendor "Gentoo" for product "Linux" and version "1.4"
-
Affected
Trustix
Search vendor "Trustix"
Secure Linux
Search vendor "Trustix" for product "Secure Linux"
1.5
Search vendor "Trustix" for product "Secure Linux" and version "1.5"
-
Affected
Trustix
Search vendor "Trustix"
Secure Linux
Search vendor "Trustix" for product "Secure Linux"
2.0
Search vendor "Trustix" for product "Secure Linux" and version "2.0"
-
Affected
Trustix
Search vendor "Trustix"
Secure Linux
Search vendor "Trustix" for product "Secure Linux"
2.1
Search vendor "Trustix" for product "Secure Linux" and version "2.1"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
2.0.47
Search vendor "Apache" for product "Http Server" and version "2.0.47"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
2.0.48
Search vendor "Apache" for product "Http Server" and version "2.0.48"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
2.0.49
Search vendor "Apache" for product "Http Server" and version "2.0.49"
-
Affected
Ibm
Search vendor "Ibm"
Http Server
Search vendor "Ibm" for product "Http Server"
2.0.42
Search vendor "Ibm" for product "Http Server" and version "2.0.42"
-
Affected
Ibm
Search vendor "Ibm"
Http Server
Search vendor "Ibm" for product "Http Server"
2.0.42.1
Search vendor "Ibm" for product "Http Server" and version "2.0.42.1"
-
Affected
Ibm
Search vendor "Ibm"
Http Server
Search vendor "Ibm" for product "Http Server"
2.0.42.2
Search vendor "Ibm" for product "Http Server" and version "2.0.42.2"
-
Affected
Ibm
Search vendor "Ibm"
Http Server
Search vendor "Ibm" for product "Http Server"
2.0.47
Search vendor "Ibm" for product "Http Server" and version "2.0.47"
-
Affected
Ibm
Search vendor "Ibm"
Http Server
Search vendor "Ibm" for product "Http Server"
2.0.47.1
Search vendor "Ibm" for product "Http Server" and version "2.0.47.1"
-
Affected
Avaya
Search vendor "Avaya"
S8300
Search vendor "Avaya" for product "S8300"
r2.0.0
Search vendor "Avaya" for product "S8300" and version "r2.0.0"
-
Affected
Avaya
Search vendor "Avaya"
S8500
Search vendor "Avaya" for product "S8500"
r2.0.0
Search vendor "Avaya" for product "S8500" and version "r2.0.0"
-
Affected
Avaya
Search vendor "Avaya"
S8700
Search vendor "Avaya" for product "S8700"
r2.0.0
Search vendor "Avaya" for product "S8700" and version "r2.0.0"
-
Affected