5
CVSSv2

CVE-2004-0113

Published: 29/03/2004 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Memory leak in ssl_engine_io.c for mod_ssl in Apache 2 prior to 2.0.49 allows remote malicious users to cause a denial of service (memory consumption) via plain HTTP requests to the SSL port of an SSL-enabled server.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server 2.0.42

apache http server 2.0.47

apache http server 2.0.35

apache http server 2.0.37

apache http server 2.0.44

apache http server 2.0.39

apache http server 2.0.41

apache http server 2.0.38

apache http server 2.0.48

apache http server 2.0.45

apache http server 2.0.40

apache http server 2.0.36

apache http server 2.0.46

apache http server 2.0.43

References

NVD-CWE-Otherhttp://www.apacheweek.com/features/security-20http://www.securityfocus.com/bid/9826http://issues.apache.org/bugzilla/show_bug.cgi?id=27106http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000839http://security.gentoo.org/glsa/glsa-200403-04.xmlhttp://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:043http://www.redhat.com/support/errata/RHSA-2004-084.htmlhttp://www.redhat.com/support/errata/RHSA-2004-182.htmlhttp://www.trustix.org/errata/2004/0017http://www.osvdb.org/4182http://marc.info/?l=bugtraq&m=108369640424244&w=2http://marc.info/?l=bugtraq&m=108034113406858&w=2http://marc.info/?l=apache-cvs&m=107869699329638http://marc.info/?l=bugtraq&m=108731648532365&w=2https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A876https://exchange.xforce.ibmcloud.com/vulnerabilities/15419https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3Ehttps://nvd.nist.gov