Apache < 2.0.55 Multiple Vulnerabilities

high Nessus Plugin ID 31656
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote version of Apache is affected by multiple vulnerabilities.


The remote host appears to be running a version of Apache that is prior to 2.0.55. It is, therefore affected by multiple vulnerabilities :

- A security issue exists where 'SSLVerifyClient' is not enforced in per-location context if 'SSLVerifyClient optional' is configured in the vhost configuration.

- A denial of service vulnerability exists when processing a large byte range request, as well as a flaw in the 'worker.c' module which could allow an attacker to force this service to consume excessive amounts of memory.

- When Apache is acting as a proxy, it is possible for a remote attacker to poison the web cache, bypass web application firewall protection, and conduct cross-site scripting attacks via an HTTP request with both a 'Transfer-Encoding: chunked' header and a 'Content-Length' header. (CVE-2005-2088)

- Multiple integer overflows exists in PCRE in quantifier parsing which could be triggered by a local user through use of a specially crafted regex in an .htaccess file.

- An issue exists where the byte range filter buffers responses into memory. (CVE-2005-2728)

- An off-by-one overflow exists in mod_ssl while printing CRL information at 'LogLevel debug' which could be triggered if configured to use a 'malicious CRL'.


Upgrade to version 2.0.55 or later.

See Also


Plugin Details

Severity: High

ID: 31656

File Name: apache_2_0_55.nasl

Version: 1.25

Type: remote

Family: Web Servers

Published: 3/26/2008

Updated: 6/29/2018

Dependencies: apache_http_version.nasl

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C


Risk Factor: High

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*

Required KB Items: installed_sw/Apache

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 7/7/2005

Reference Information

CVE: CVE-2005-1268, CVE-2005-2088, CVE-2005-2700, CVE-2005-2728, CVE-2005-2491, CVE-2005-2970

BID: 14620, 14721, 14106, 14366, 14660, 15762