CVE-2004-0809

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The mod_dav module in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (child process crash) via a certain sequence of LOCK requests for a location that allows WebDAV authoring access.

References

http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml

http://www.debian.org/security/2004/dsa-558

http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096

http://www.redhat.com/support/errata/RHSA-2004-463.html

http://www.trustix.org/errata/2004/0047/

http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/dav/fs/lock.c?r1=1.32&r2=1.33

https://exchange.xforce.ibmcloud.com/vulnerabilities/17366

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9588

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

Details

Source: MITRE

Published: 2004-09-16

Updated: 2021-06-06

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*

cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:a:hp:secure_web_server_for_tru64:5.1_a:*:*:*:*:*:*:*

cpe:2.3:a:hp:secure_web_server_for_tru64:5.8.1:*:*:*:*:*:*:*

cpe:2.3:a:hp:secure_web_server_for_tru64:5.8.2:*:*:*:*:*:*:*

cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*

cpe:2.3:o:hp:hp-ux:11.23:*:ia64_64-bit:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*

cpe:2.3:a:hp:secure_web_server_for_tru64:4.0_f:*:*:*:*:*:*:*

cpe:2.3:a:hp:secure_web_server_for_tru64:4.0_g:*:*:*:*:*:*:*

cpe:2.3:a:hp:secure_web_server_for_tru64:6.3.0:*:*:*:*:*:*:*

cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*

cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*

cpe:2.3:a:hp:secure_web_server_for_tru64:5.1:*:*:*:*:*:*:*

cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*

cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*

cpe:2.3:a:hp:secure_web_server_for_tru64:5.0_a:*:*:*:*:*:*:*

cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*

cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*

cpe:2.3:o:turbolinux:turbolinux_home:*:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*

cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*

cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*

cpe:2.3:a:hp:secure_web_server_for_tru64:5.9.1:*:*:*:*:*:*:*

cpe:2.3:a:hp:secure_web_server_for_tru64:5.9.2:*:*:*:*:*:*:*

cpe:2.3:o:turbolinux:turbolinux_server:10.0:*:*:*:*:*:*:*

cpe:2.3:o:turbolinux:turbolinux_desktop:10.0:*:*:*:*:*:*:*

cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*

Tenable Plugins

View all (18 total)

IDNameProductFamilySeverity
41330SuSE9 Security Update : the webdav apache module (YOU Patch Number 9363)NessusSuSE Local Security Checks
medium
37996FreeBSD : mod_dav -- lock related denial-of-service (013fa252-0724-11d9-b45d-000c41e2cdad)NessusFreeBSD Local Security Checks
medium
15656Debian DSA-558-1 : libapache-mod-dav - NULL pointer dereferenceNessusDebian Local Security Checks
medium
14766GLSA-200409-21 : Apache 2, mod_dav: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
14762FreeBSD : mod_dav -- lock related denial-of-service (15)NessusFreeBSD Local Security Checks
medium
14752Mandrake Linux Security Advisory : apache2 (MDKSA-2004:096)NessusMandriva Local Security Checks
high
14748Apache 2.0.x < 2.0.51 Multiple Vulnerabilities (OF, DoS)NessusWeb Servers
medium
2292Apache < 2.0.51 IPv6 Remote Buffer OverflowNessus Network MonitorWeb Servers
medium
2291Apache < 2.0.51 mod_dav DAV LOCK Command Remote DoSNessus Network MonitorWeb Servers
medium
2290Apache < 2.0.51 ${ENVVAR} Local OverflowNessus Network MonitorWeb Servers
medium
14736RHEL 3 : httpd (RHSA-2004:463)NessusRed Hat Local Security Checks
medium
2276Apache < 2.0.51 mod_ssl Rewrite Rules DoSNessus Network MonitorWeb Servers
medium
2254Apache < 2.0.51 Multiple VulnerabilitiesNessus Network MonitorWeb Servers
high
800587Apache < 2.0.51 mod_ssl Rewrite Rules DoSLog Correlation EngineWeb Servers
medium
800565Apache < 2.0.51 mod_dav DAV LOCK Command Remote DoSLog Correlation EngineWeb Servers
medium
800564Apache < 2.0.51 Multiple VulnerabilitiesLog Correlation EngineWeb Servers
medium
800562Apache < 2.0.51 ${ENVVAR} Local OverflowLog Correlation EngineWeb Servers
medium
800560Apache < 2.0.51 IPv6 Remote Buffer OverflowLog Correlation EngineWeb Servers
medium