5
CVSSv2

CVE-2005-2970

Published: 25/10/2005 Updated: 13/02/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Memory leak in the worker MPM (worker.c) for Apache 2, in certain circumstances, allows remote malicious users to cause a denial of service (memory consumption) via aborted connections, which prevents the memory for the transaction pool from being reused for other connections.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server

canonical ubuntu linux 4.10

canonical ubuntu linux 5.04

canonical ubuntu linux 5.10

redhat enterprise linux desktop 3.0

redhat enterprise linux desktop 4.0

redhat enterprise linux server 4.0

redhat enterprise linux workstation 4.0

redhat enterprise linux workstation 3.0

redhat enterprise linux server 3.0

fedoraproject fedora core 4

Vendor Advisories

Synopsis httpd security update Type/Severity Security Advisory: Moderate Topic Updated Apache httpd packages that correct three security issues are nowavailable for Red Hat Enterprise Linux 3 and 4This update has been rated as having moderate security impact by the RedHat Security Response Team D ...
Debian Bug report logs - #340337 apache2-mpm-worker: memory leak which can occur after an aborted connection (CVE-2005-2970) Package: apache2-mpm-worker; Maintainer for apache2-mpm-worker is Debian Apache Maintainers <debian-apache@listsdebianorg>; Source for apache2-mpm-worker is src:apache2 (PTS, buildd, popcon) Reported ...
A memory leak was found in the Apache 2 ‘worker’ module in the handling of aborted TCP connections By repeatedly triggering this situation, a remote attacker could drain all available memory, which eventually led to a Denial of Service ...

References

CWE-770http://svn.apache.org/viewcvs?rev=292949&view=revhttp://securitytracker.com/id?1015093http://www.novell.com/linux/security/advisories/2005_28_sr.htmlhttp://www.securityfocus.com/bid/15762http://secunia.com/advisories/16559http://secunia.com/advisories/17923http://secunia.com/advisories/18161http://rhn.redhat.com/errata/RHSA-2006-0159.htmlhttp://secunia.com/advisories/18333http://www.redhat.com/archives/fedora-announce-list/2006-January/msg00060.htmlhttp://secunia.com/advisories/18585http://www.mandriva.com/security/advisories?name=MDKSA-2005:233https://www.ubuntu.com/usn/usn-225-1/https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10043http://www.securityfocus.com/archive/1/425399/100/0/threadedhttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3Ehttp://mail-archives.apache.org/mod_mbox/httpd-cvs/200509.mbox/%3C20051001110218.40692.qmail%40minotaur.apache.org%3Ehttps://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3Ehttps://access.redhat.com/errata/RHSA-2006:0159https://usn.ubuntu.com/225-1/https://nvd.nist.gov