Published: 31/12/2002 Updated: 18/10/2016
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

mod_cgi in Apache 2.0.39 and 2.0.40 allows local users and possibly remote malicious users to cause a denial of service (hang and memory consumption) by causing a CGI script to send a large amount of data to stderr, which results in a read/write deadlock between httpd and the CGI script.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.
Vulnerable Product Search on Vulmon Subscribe to Product

apache http server 2.0.40

apache http server 2.0.39


source: wwwsecurityfocuscom/bid/5787/info Apache is prone to a denial of service condition when an excessive amount of data is written to stderr This condition reportedly occurs when the amount of data written to stderr is over the default amount allowed by the operating system This may potentially be an issue in web applications that ...