CVE-2004-0493

Current Description

The ap_get_mime_headers_core function in Apache httpd 2.0.49 allows remote attackers to cause a denial of service (memory exhaustion), and possibly an integer signedness error leading to a heap-based buffer overflow on 64 bit systems, via long header lines with large numbers of space or tab characters.

Basic Data

PublishedAugust 06, 2004
Last ModifiedOctober 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:N/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score6.4
SeverityMEDIUM
Exploitability Score10.0
Impact Score4.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3HardwareAvayaConverged Communications Server2.0*******
    2.3OSGentooLinux1.4*******
    2.3OSTrustixSecure Linux1.5*******
    2.3OSTrustixSecure Linux2.0*******
    2.3OSTrustixSecure Linux2.1*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationApacheHttp Server2.0.47*******
    2.3ApplicationApacheHttp Server2.0.48*******
    2.3ApplicationApacheHttp Server2.0.49*******
    2.3ApplicationIbmHttp Server2.0.42*******
    2.3ApplicationIbmHttp Server2.0.42.1*******
    2.3ApplicationIbmHttp Server2.0.42.2*******
    2.3ApplicationIbmHttp Server2.0.47*******
    2.3ApplicationIbmHttp Server2.0.47.1*******
    2.3HardwareAvayaS8300r2.0.0*******
    2.3HardwareAvayaS8500r2.0.0*******
    2.3HardwareAvayaS8700r2.0.0*******

Vulnerable Software List

VendorProductVersions
Avaya S8300 r2.0.0
Avaya S8500 r2.0.0
Avaya S8700 r2.0.0
Avaya Converged Communications Server 2.0
Apache Http Server 2.0.47, 2.0.48, 2.0.49
Ibm Http Server 2.0.42, 2.0.42.1, 2.0.42.2, 2.0.47, 2.0.47.1
Trustix Secure Linux 1.5, 2.0, 2.1
Gentoo Linux 1.4

References

NameSourceURLTags
20040628 DoS in apache httpd 2.0.49, yet still apache much better than windowshttp://lists.grok.org.uk/pipermail/full-disclosure/2004-June/023133.htmlFULLDISC
20040629 TSSA-2004-012 - apachehttp://marc.info/?l=bugtraq&m=108853066800184&w=2BUGTRAQ
SSRT4777http://marc.info/?l=bugtraq&m=109181600614477&w=2HP
GLSA-200407-03http://security.gentoo.org/glsa/glsa-200407-03.xmlGENTOO
http://www.apacheweek.com/features/security-20http://www.apacheweek.com/features/security-20CONFIRM
http://www.guninski.com/httpd1.htmlhttp://www.guninski.com/httpd1.htmlMISC
MDKSA-2004:064http://www.mandriva.com/security/advisories?name=MDKSA-2004:064MANDRAKE
RHSA-2004:342http://www.redhat.com/support/errata/RHSA-2004-342.htmlREDHAT
10619http://www.securityfocus.com/bid/10619BIDExploit PATCH Vendor Advisory
2004-0039http://www.trustix.org/errata/2004/0039/TRUSTIX
apache-apgetmimeheaderscore-dos(16524)https://exchange.xforce.ibmcloud.com/vulnerabilities/16524XF
[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.htmlhttps://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3CcvsMLIST
[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.htmlhttps://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3CcvsMLIST
[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.htmlhttps://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3CcvMLIST
[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.htmlhttps://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3CcvMLIST
oval:org.mitre.oval:def:10605https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10605OVAL