CVE-2004-0786

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The IPv6 URI parsing routines in the apr-util library for Apache 2.0.50 and earlier allow remote attackers to cause a denial of service (child process crash) via a certain URI, as demonstrated using the Codenomicon HTTP Test Tool.

References

http://www.redhat.com/support/errata/RHSA-2004-463.html

http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml

http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096

http://www.novell.com/linux/security/advisories/2004_32_apache2.html

http://www.trustix.org/errata/2004/0047/

http://secunia.com/advisories/12540

https://exchange.xforce.ibmcloud.com/vulnerabilities/17382

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11380

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

Details

Source: MITRE

Published: 2004-10-20

Updated: 2021-06-06

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Tenable Plugins

View all (18 total)

IDNameProductFamilySeverity
37109FreeBSD : apache -- apr_uri_parse IPv6 address handling vulnerability (762d1c6d-0722-11d9-b45d-000c41e2cdad)NessusFreeBSD Local Security Checks
medium
15898Mac OS X Multiple Vulnerabilities (Security Update 2004-12-02)NessusMacOS X Local Security Checks
high
14766GLSA-200409-21 : Apache 2, mod_dav: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
14765Fedora Core 2 : apr-util-0.9.4-14.2 (2004-308)NessusFedora Local Security Checks
medium
14764Fedora Core 1 : apr-util-0.9.4-2.1 (2004-307)NessusFedora Local Security Checks
medium
14761FreeBSD : apache -- apr_uri_parse IPv6 address handling vulnerability (14)NessusFreeBSD Local Security Checks
medium
14752Mandrake Linux Security Advisory : apache2 (MDKSA-2004:096)NessusMandriva Local Security Checks
high
14748Apache 2.0.x < 2.0.51 Multiple Vulnerabilities (OF, DoS)NessusWeb Servers
medium
2292Apache < 2.0.51 IPv6 Remote Buffer OverflowNessus Network MonitorWeb Servers
medium
2290Apache < 2.0.51 ${ENVVAR} Local OverflowNessus Network MonitorWeb Servers
medium
14736RHEL 3 : httpd (RHSA-2004:463)NessusRed Hat Local Security Checks
medium
14731SUSE-SA:2004:032: apache2NessusSuSE Local Security Checks
medium
2276Apache < 2.0.51 mod_ssl Rewrite Rules DoSNessus Network MonitorWeb Servers
medium
2254Apache < 2.0.51 Multiple VulnerabilitiesNessus Network MonitorWeb Servers
high
800587Apache < 2.0.51 mod_ssl Rewrite Rules DoSLog Correlation EngineWeb Servers
medium
800564Apache < 2.0.51 Multiple VulnerabilitiesLog Correlation EngineWeb Servers
medium
800562Apache < 2.0.51 ${ENVVAR} Local OverflowLog Correlation EngineWeb Servers
medium
800560Apache < 2.0.51 IPv6 Remote Buffer OverflowLog Correlation EngineWeb Servers
medium