CVE-2004-0751

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The char_buffer_read function in the mod_ssl module for Apache 2.x, when using reverse proxying to an SSL server, allows remote attackers to cause a denial of service (segmentation fault).

References

http://www.redhat.com/support/errata/RHSA-2004-463.html

http://issues.apache.org/bugzilla/show_bug.cgi?id=30134

http://archives.neohapsis.com/archives/bugtraq/2004-09/0096.html

http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml

http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096

http://www.novell.com/linux/security/advisories/2004_30_apache2.html

http://www.trustix.org/errata/2004/0047/

https://exchange.xforce.ibmcloud.com/vulnerabilities/17273

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11864

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

Details

Source: MITRE

Published: 2004-10-20

Updated: 2021-06-06

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Tenable Plugins

View all (14 total)

IDNameProductFamilySeverity
37076FreeBSD : apache2 -- SSL remote DoS (7b81fc47-239f-11d9-814e-0001020eed82)NessusFreeBSD Local Security Checks
medium
15898Mac OS X Multiple Vulnerabilities (Security Update 2004-12-02)NessusMacOS X Local Security Checks
high
15575FreeBSD : apache2 -- SSL remote DoS (16)NessusFreeBSD Local Security Checks
medium
14766GLSA-200409-21 : Apache 2, mod_dav: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
14752Mandrake Linux Security Advisory : apache2 (MDKSA-2004:096)NessusMandriva Local Security Checks
high
14748Apache 2.0.x < 2.0.51 Multiple Vulnerabilities (OF, DoS)NessusWeb Servers
medium
2292Apache < 2.0.51 IPv6 Remote Buffer OverflowNessus Network MonitorWeb Servers
medium
14736RHEL 3 : httpd (RHSA-2004:463)NessusRed Hat Local Security Checks
medium
2276Apache < 2.0.51 mod_ssl Rewrite Rules DoSNessus Network MonitorWeb Servers
medium
14667SUSE-SA:2004:030: apache2NessusSuSE Local Security Checks
medium
2254Apache < 2.0.51 Multiple VulnerabilitiesNessus Network MonitorWeb Servers
high
14624RHEL 3 : httpd (RHSA-2004:349)NessusRed Hat Local Security Checks
medium
800587Apache < 2.0.51 mod_ssl Rewrite Rules DoSLog Correlation EngineWeb Servers
medium
800564Apache < 2.0.51 Multiple VulnerabilitiesLog Correlation EngineWeb Servers
medium