6.4
CVSSv2

CVE-2004-0493

Published: 06/08/2004 Updated: 07/11/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 650
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P

Vulnerability Summary

The ap_get_mime_headers_core function in Apache httpd 2.0.49 allows remote malicious users to cause a denial of service (memory exhaustion), and possibly an integer signedness error leading to a heap-based buffer overflow on 64 bit systems, via long header lines with large numbers of space or tab characters.

Vulnerable Product Search on Vulmon Subscribe to Product

trustix secure linux 2.0

avaya converged communications server 2.0

trustix secure linux 1.5

gentoo linux 1.4

trustix secure linux 2.1

apache http server 2.0.47

ibm http server 2.0.42.1

avaya s8300 r2.0.0

apache http server 2.0.49

ibm http server 2.0.42

ibm http server 2.0.47.1

apache http server 2.0.48

ibm http server 2.0.42.2

avaya s8700 r2.0.0

avaya s8500 r2.0.0

ibm http server 2.0.47

Vendor Advisories

Synopsis httpd security update Type/Severity Security Advisory: Important Topic Updated httpd packages that fix a buffer overflow in mod_ssl and a remotelytriggerable memory leak are now available Description The Apache HTTP server is a powerful, full-featured, efficient, andfreely-availab ...

Exploits

#include <stdioh> #include <stdlibh> #include <sys/waith> #include <sys/typesh> #include <netinet/inh> #include <sys/socketh> #include <errnoh> #include <stringh> #include <unistdh> #define A 0x41 #define PORT 80 struct sockaddr_in hrm; int conn(char *ip) { int sockfd; hrmsin_family ...
#/usr/bin/perl # #exploit for apache ap_get_mime_headers_core() vuln # #adv is here: wwwguninskicom/httpd1html # #version: apache 2 <2049 apache 1 not tested # #by bkbll bkbll#cnhonkernet wwwcnhonkercom # #tail -f /var/log/messages #Jul 1 17:43:16 www kernel: Out of Memory: Killed process 658 (httpd) # use IO::Socket::INE ...

References

NVD-CWE-Otherhttp://www.securityfocus.com/bid/10619http://lists.grok.org.uk/pipermail/full-disclosure/2004-June/023133.htmlhttp://www.guninski.com/httpd1.htmlhttp://www.apacheweek.com/features/security-20http://security.gentoo.org/glsa/glsa-200407-03.xmlhttp://www.redhat.com/support/errata/RHSA-2004-342.htmlhttp://www.trustix.org/errata/2004/0039/http://www.mandriva.com/security/advisories?name=MDKSA-2004:064http://marc.info/?l=bugtraq&m=109181600614477&w=2http://marc.info/?l=bugtraq&m=108853066800184&w=2https://exchange.xforce.ibmcloud.com/vulnerabilities/16524https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10605https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3Ehttps://access.redhat.com/errata/RHSA-2004:342https://nvd.nist.govhttps://www.exploit-db.com/exploits/371/