Apache mod_ssl ssl_hook_Access Error Handling DoS

medium Nessus Plugin ID 20386

Synopsis

The remote web server is affected by a denial of service vulnerability.

Description

The version of Apache running on the remote host is affected by a denial of service vulnerability due to a flaw in mod_ssl that occurs when it is configured with an SSL vhost with access control and a custom 400 error page. A remote attacker can exploit this, via a non-SSL request to an SSL port, to cause a NULL pointer to be dereferenced, resulting in crashing individual child processes or even the entire server.

Solution

Upgrade to Apache version 2.0.58 or later. Alternatively, update the Apache configuration to use 'SSLRequire' whenever 'SSLCipherSuite' is used.

See Also

https://bz.apache.org/bugzilla/show_bug.cgi?id=37791

http://www.nessus.org/u?08a97b5b

Plugin Details

Severity: Medium

ID: 20386

File Name: apache_mod_ssl_error_document_dos.nasl

Version: 1.28

Type: remote

Family: Web Servers

Published: 1/10/2006

Updated: 6/12/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5.4

Temporal Score: 4

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:N/A:C

CVSS v3

Risk Factor: Medium

Base Score: 5.9

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:http_server

Required KB Items: installed_sw/Apache

Exploit Ease: No known exploits are available

Patch Publication Date: 5/1/2006

Vulnerability Publication Date: 12/5/2005

Reference Information

CVE: CVE-2005-3357

BID: 16152