mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote malicious users to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache http server 2.0 |
||
apache http server 2.0.9 |
||
apache http server 2.0.28 |
||
apache http server 2.0.32 |
||
apache http server 2.0.35 |
||
apache http server 2.0.36 |
||
apache http server 2.0.37 |
||
apache http server 2.0.38 |
||
apache http server 2.0.39 |
||
apache http server 2.0.40 |
||
apache http server 2.0.41 |
||
apache http server 2.0.42 |
||
apache http server 2.0.43 |
||
apache http server 2.0.44 |
||
apache http server 2.0.45 |
||
apache http server 2.0.46 |
||
apache http server 2.0.47 |
||
apache http server 2.0.48 |
||
apache http server 2.0.49 |
||
apache http server 2.0.50 |
||
apache http server 2.0.51 |
||
apache http server 2.0.52 |
||
apache http server 2.0.53 |
||
apache http server 2.0.54 |
||
apache http server 2.0.55 |