CVE-2004-0493
Apache - Arbitrary Long HTTP Headers Denial of Service
Severity Score
6.4
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
3
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The ap_get_mime_headers_core function in Apache httpd 2.0.49 allows remote attackers to cause a denial of service (memory exhaustion), and possibly an integer signedness error leading to a heap-based buffer overflow on 64 bit systems, via long header lines with large numbers of space or tab characters.
La función ap_get_mime_headers_core de Apache httpd 2.0.49 permite a atacantes remotos causar una denegación de servicio (consumición de memoria) y posiblemente un error de entero sin signo que conduce a un desbordamiento de búfer basado en el montón en en sistemas de 64 bits, mediante líneas de cabecera largas con muchos caractéres espacio o tabulador.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2004-05-27 CVE Reserved
- 2004-06-30 CVE Published
- 2004-07-22 First Exploit
- 2024-01-06 EPSS Updated
- 2024-08-08 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
CAPEC
References (28)
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/371 | 2004-08-02 | |
https://www.exploit-db.com/exploits/360 | 2004-07-22 | |
http://www.securityfocus.com/bid/10619 | 2024-08-08 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://marc.info/?l=bugtraq&m=109181600614477&w=2 | 2023-11-07 | |
http://security.gentoo.org/glsa/glsa-200407-03.xml | 2023-11-07 | |
http://www.mandriva.com/security/advisories?name=MDKSA-2004:064 | 2023-11-07 | |
http://www.redhat.com/support/errata/RHSA-2004-342.html | 2023-11-07 | |
http://www.trustix.org/errata/2004/0039 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2004-0493 | 2004-07-06 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1617211 | 2004-07-06 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Avaya Search vendor "Avaya" | Converged Communications Server Search vendor "Avaya" for product "Converged Communications Server" | 2.0 Search vendor "Avaya" for product "Converged Communications Server" and version "2.0" | - |
Affected
| ||||||
Gentoo Search vendor "Gentoo" | Linux Search vendor "Gentoo" for product "Linux" | 1.4 Search vendor "Gentoo" for product "Linux" and version "1.4" | - |
Affected
| ||||||
Trustix Search vendor "Trustix" | Secure Linux Search vendor "Trustix" for product "Secure Linux" | 1.5 Search vendor "Trustix" for product "Secure Linux" and version "1.5" | - |
Affected
| ||||||
Trustix Search vendor "Trustix" | Secure Linux Search vendor "Trustix" for product "Secure Linux" | 2.0 Search vendor "Trustix" for product "Secure Linux" and version "2.0" | - |
Affected
| ||||||
Trustix Search vendor "Trustix" | Secure Linux Search vendor "Trustix" for product "Secure Linux" | 2.1 Search vendor "Trustix" for product "Secure Linux" and version "2.1" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Http Server Search vendor "Apache" for product "Http Server" | 2.0.47 Search vendor "Apache" for product "Http Server" and version "2.0.47" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Http Server Search vendor "Apache" for product "Http Server" | 2.0.48 Search vendor "Apache" for product "Http Server" and version "2.0.48" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Http Server Search vendor "Apache" for product "Http Server" | 2.0.49 Search vendor "Apache" for product "Http Server" and version "2.0.49" | - |
Affected
| ||||||
Ibm Search vendor "Ibm" | Http Server Search vendor "Ibm" for product "Http Server" | 2.0.42 Search vendor "Ibm" for product "Http Server" and version "2.0.42" | - |
Affected
| ||||||
Ibm Search vendor "Ibm" | Http Server Search vendor "Ibm" for product "Http Server" | 2.0.42.1 Search vendor "Ibm" for product "Http Server" and version "2.0.42.1" | - |
Affected
| ||||||
Ibm Search vendor "Ibm" | Http Server Search vendor "Ibm" for product "Http Server" | 2.0.42.2 Search vendor "Ibm" for product "Http Server" and version "2.0.42.2" | - |
Affected
| ||||||
Ibm Search vendor "Ibm" | Http Server Search vendor "Ibm" for product "Http Server" | 2.0.47 Search vendor "Ibm" for product "Http Server" and version "2.0.47" | - |
Affected
| ||||||
Ibm Search vendor "Ibm" | Http Server Search vendor "Ibm" for product "Http Server" | 2.0.47.1 Search vendor "Ibm" for product "Http Server" and version "2.0.47.1" | - |
Affected
| ||||||
Avaya Search vendor "Avaya" | S8300 Search vendor "Avaya" for product "S8300" | r2.0.0 Search vendor "Avaya" for product "S8300" and version "r2.0.0" | - |
Affected
| ||||||
Avaya Search vendor "Avaya" | S8500 Search vendor "Avaya" for product "S8500" | r2.0.0 Search vendor "Avaya" for product "S8500" and version "r2.0.0" | - |
Affected
| ||||||
Avaya Search vendor "Avaya" | S8700 Search vendor "Avaya" for product "S8700" | r2.0.0 Search vendor "Avaya" for product "S8700" and version "r2.0.0" | - |
Affected
|