Plugin ID | 310 |
Plugin name | Apache prior 1.3.31 and prior 2.0.49 connection blocking denial of service |
Plugin filename | Apache prior 1.3.31 and prior 2.0.49 connection blocking denial of service.plugin |
Plugin filesize | 3040 bytes |
Plugin family | HTTP |
Plugin created name | Marc Ruef |
Plugin created email | marc.ruef at computec.ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2005/01/05 |
Plugin version | 1.0 |
Plugin protocol | tcp |
Plugin port | 80 |
Plugin procedure detection | open|sleep|close|pattern_exists|open|send HEAD / HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# ###*Server: Apache*1.[0-2].* OR HTTP/#.# ###*Server: Apache*1.3.[0-2]* OR HTTP/#.# ###*Server: Apache*1.3.3[0-1]* OR HTTP/#.# ###*Server: Apache*2.0.[0-3]* OR HTTP/#.# ###*Server: Apache*2.0.4[0-9]* |
Plugin detection accuracy | 85 |
Plugin comment | The NASL script is Copyright (C) 2004 Scott Shebby |
Bug produced name | Apache Software Foundation |
Bug produced email | apache at apache dot org |
Bug produced web | http://httpd.apache.org |
Bug affected | Apache prior 1.3.31 and prior 2.0.49 |
Bug not affected | Apache prior 1.3.31 and prior 2.0.49 on Linux and FreeBSD, newer versions or other web server solutions. |
Bug vulnerability class | Denial Of Service |
Bug false positives | This script is not able to detect if the target host is running Linux or FreeBSD. |
Bug description | The remote web server appears to be running a version of Apache that is less that 2.0.49 or 1.3.31. These versions are vulnerable to a denial of service attack where a remote attacker can block new connections to the server by connecting to a listening socket on a rarely accessed port. |
Bug solution | Upgrade to Apache 2.0.49 or 1.3.31. |
Bug fixing time | Approx. 20 minutes |
Bug exploit availability | Maybe |
Bug exploit url | http://www.securityfocus.com/bid/9921/exploit/ |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Medium |
Bug popularity | 6 |
Bug simplicity | 7 |
Bug impact | 7 |
Bug risk | 7 |
Bug check tools | Nessus can check this flaw with the plugin 12280 (Apache Connection Blocking Denial of Service). |
Source CVE | CAN-2004-0174 |
Source SecurityFocus BID | 9921 |
Source Nessus ID | 12280 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |