7.2
CVSSv2

CVE-2002-0839

Published: 11/10/2002 Updated: 07/11/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The shared memory scoreboard in the HTTP daemon for Apache 1.3.x prior to 1.3.27 allows any user running as the Apache UID to send a SIGUSR1 signal to any process as root, resulting in a denial of service (process kill) or possibly other behaviors that would not normally be allowed, by modifying the parent[].pid and parent[].last_rtime segments in the scoreboard.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server

debian debian linux 2.2

debian debian linux 3.0

Vendor Advisories

According to David Wagner, iDEFENSE and the Apache HTTP Server Project, several vulnerabilities have been found in the Apache server package, a commonly used webserver Most of the code is shared between the Apache and Apache-Perl packages, so vulnerabilities are shared as well These vulnerabilities could allow an attacker to enact a denial of ser ...
According to David Wagner, iDEFENSE and the Apache HTTP Server Project, several vulnerabilities have been found in the Apache package, a commonly used webserver Most of the code is shared between the Apache and Apache-SSL packages, so vulnerabilities are shared as well These vulnerabilities could allow an attacker to enact a denial of service aga ...

References

NVD-CWE-noinfohttp://archives.neohapsis.com/archives/vulnwatch/2002-q4/0012.htmlhttp://www.apacheweek.com/issues/02-10-04http://www.iss.net/security_center/static/10280.phphttp://www.linuxsecurity.com/advisories/other_advisory-2414.htmlhttp://www.linux-mandrake.com/en/security/2002/MDKSA-2002-068.phphttp://www.debian.org/security/2002/dsa-187http://www.debian.org/security/2002/dsa-188http://www.debian.org/security/2002/dsa-195ftp://patches.sgi.com/support/free/security/advisories/20021105-01-Ihttp://online.securityfocus.com/advisories/4617http://archives.neohapsis.com/archives/bugtraq/2002-10/0195.htmlhttp://archives.neohapsis.com/archives/bugtraq/2002-10/0254.htmlhttp://www.securityfocus.com/bid/5884http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000530http://marc.info/?l=bugtraq&m=130497311408250&w=2http://marc.info/?l=bugtraq&m=103376585508776&w=2http://marc.info/?l=apache-httpd-announce&m=103367938230488&w=2https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3Ehttps://nvd.nist.govhttps://www.debian.org/security/./dsa-195