5
CVSSv2

CVE-2003-0132

Published: 11/04/2003 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 510
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A memory leak in Apache 2.0 up to and including 2.0.44 allows remote malicious users to cause a denial of service (memory consumption) via large chunks of linefeed characters, which causes Apache to allocate 80 bytes for each linefeed.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server

Exploits

/******** th-apachedosc ******************************************************** * * * Remote Apache DoS exploit * * ------------------------- * * Written as a poc for the: * * * This program sends 8000000 \n's to exploit the Apache memory leak * * Works from scratch under Linux, as opposed to apache-massacrec * * * * Daniel Nyström <ex ...
/* apache-massacrec * Test code for Apache 2x Memory Leak * By Matthew Murphy * * DISCLAIMER: This exploit tool is provided only to test networks for a * known vulnerability Do not use this tool on systems you do not control, * and do not use this tool on networks you do not own without appropriate * consent from the network owner You are respo ...

Github Repositories

Tools to dump CVE/CPE data from NVD to database, and run API server on top of that

go-nvd NVD officially provides APIs for CPE and CVE, while both are set with rate limit To support high-volume query, go-nvd supports command to dump data from NVD to self-owned database and run API server on top of that to provide same API spec and part of parameters as NVD Available database: mongo API DB (nvd) ┌──â”

References

CWE-772http://www.idefense.com/advisory/04.08.03.txthttp://www.redhat.com/support/errata/RHSA-2003-139.htmlhttp://lists.apple.com/mhonarc/security-announce/msg00028.htmlhttp://www.kb.cert.org/vuls/id/206537http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=205147http://secunia.com/advisories/8499http://secunia.com/advisories/34920http://www.vupen.com/english/advisories/2009/1233http://marc.info/?l=bugtraq&m=105013378320711&w=2http://marc.info/?l=bugtraq&m=104994309010974&w=2http://marc.info/?l=bugtraq&m=105001663120995&w=2http://marc.info/?l=bugtraq&m=104931360606484&w=2http://marc.info/?l=bugtraq&m=104982175321731&w=2http://marc.info/?l=bugtraq&m=104994239010517&w=2https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A156https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3Ehttps://nvd.nist.govhttps://github.com/shlin168/go-nvdhttps://www.exploit-db.com/exploits/11/https://www.kb.cert.org/vuls/id/206537