CVE-2004-0809

Current Description

The mod_dav module in Apache 2.0.50 and earlier allows remote attackers to cause a denial of service (child process crash) via a certain sequence of LOCK requests for a location that allows WebDAV authoring access.

Basic Data

PublishedSeptember 16, 2004
Last ModifiedOctober 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactNONE
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationApacheHttp Server2.0.47*******
    2.3ApplicationApacheHttp Server2.0.50*******
    2.3OSConectivaLinux9.0*******
    2.3OSConectivaLinux10.0*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationHpSecure Web Server For Tru644.0_f*******
    2.3ApplicationHpSecure Web Server For Tru644.0_g*******
    2.3ApplicationHpSecure Web Server For Tru645.0_a*******
    2.3ApplicationHpSecure Web Server For Tru645.1*******
    2.3ApplicationHpSecure Web Server For Tru645.1_a*******
    2.3ApplicationHpSecure Web Server For Tru645.8.1*******
    2.3ApplicationHpSecure Web Server For Tru645.8.2*******
    2.3ApplicationHpSecure Web Server For Tru645.9.1*******
    2.3ApplicationHpSecure Web Server For Tru645.9.2*******
    2.3ApplicationHpSecure Web Server For Tru646.3.0*******
    2.3OSGentooLinux1.4*******
    2.3OSHpHp-ux11.00*******
    2.3OSHpHp-ux11.11*******
    2.3OSHpHp-ux11.22*******
    2.3OSHpHp-ux11.23*ia64_64-bit*****
    2.3OSMandrakesoftMandrake Linux9.2*******
    2.3OSMandrakesoftMandrake Linux9.2*amd64*****
    2.3OSMandrakesoftMandrake Linux10.0*******
    2.3OSMandrakesoftMandrake Linux10.0*amd64*****
    2.3OSRedhatEnterprise Linux3.0*advanced_server*****
    2.3OSRedhatEnterprise Linux3.0*enterprise_server*****
    2.3OSRedhatEnterprise Linux3.0*workstation_server*****
    2.3OSRedhatEnterprise Linux Desktop3.0*******
    2.3OSTrustixSecure Linux2.0*******
    2.3OSTrustixSecure Linux2.1*******
    2.3OSTurbolinuxTurbolinux Desktop10.0*******
    2.3OSTurbolinuxTurbolinux Home********
    2.3OSTurbolinuxTurbolinux Server10.0*******

Vulnerable Software List

VendorProductVersions
Apache Http Server 2.0.47, 2.0.50
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux Desktop 3.0
Conectiva Linux 10.0, 9.0
Mandrakesoft Mandrake Linux 10.0, 9.2
Hp Secure Web Server For Tru64 4.0_f, 4.0_g, 5.0_a, 5.1, 5.1_a, 5.8.1, 5.8.2, 5.9.1, 5.9.2, 6.3.0
Hp Hp-ux 11.00, 11.11, 11.22, 11.23
Turbolinux Turbolinux Desktop 10.0
Turbolinux Turbolinux Server 10.0
Turbolinux Turbolinux Home *
Trustix Secure Linux 2.0, 2.1
Gentoo Linux 1.4

References

NameSourceURLTags
http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/dav/fs/lock.c?r1=1.32&r2=1.33http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/dav/fs/lock.c?r1=1.32&r2=1.33CONFIRM
DSA-558http://www.debian.org/security/2004/dsa-558DEBIANPATCH Vendor Advisory
GLSA-200409-21http://www.gentoo.org/security/en/glsa/glsa-200409-21.xmlGENTOOPATCH Vendor Advisory
MDKSA-2004:096http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096MANDRAKE
RHSA-2004:463http://www.redhat.com/support/errata/RHSA-2004-463.htmlREDHATVendor Advisory
2004-0047http://www.trustix.org/errata/2004/0047/TRUSTIXExploit PATCH Vendor Advisory
apache-moddav-lock-dos(17366)https://exchange.xforce.ibmcloud.com/vulnerabilities/17366XF
[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.htmlhttps://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3CcvsMLIST
[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.htmlhttps://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3CcvsMLIST
[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.htmlhttps://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3CcvMLIST
[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.htmlhttps://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3CcvMLIST
oval:org.mitre.oval:def:9588https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9588OVAL