Plugin ID | 137 |
Plugin name | Apache prior 2.0.50 mod_ssl Denial of Service |
Plugin filename | Apache prior 2.0.50 mod_ssl Denial of Service.plugin |
Plugin filesize | 3946 bytes |
Plugin family | HTTP |
Plugin created name | Marc Ruef |
Plugin created email | marc dot ruef at computec dot ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2004/09/02 |
Plugin updated name | Marc Ruef |
Plugin updated email | marc dot ruef at computec dot ch |
Plugin updated web | http://www.computec.ch |
Plugin updated company | computec.ch |
Plugin updated date | 2004/11/14 |
Plugin version | 2.0 |
Plugin changelog | Deleted a not needed sleep command before the send command in version 1.1. Added the ISS X-Force and SecurityFocus BID data in version 1.2. Corrected the bug_published data in version 1.3. Corrected the plugin structure and added the accuracy values in 1.4. Improved the pattern matching and introduced the plugin changelog in 2.0 |
Plugin protocol | tcp |
Plugin port | 80 |
Plugin procedure detection | open|send HEAD / HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/1.[0-1] ### *Server: Apache/2.0.[0-4][0-9]* OR HTTP/1.[0-1] ### *Server: Apache/2.0.50* |
Plugin detection accuracy | 80 |
Plugin comment | This plugin was written with the ATK Attack Editor. |
Bug published name | Mick Wall |
Bug published email | mick at mickandwendy dot com |
Bug published web | http://www.mickandwendy.com |
Bug published date | 2004/09/01 |
Bug advisory | http://rhn.redhat.com/errata/RHSA-2004-349.html |
Bug produced name | Apache Software Foundation |
Bug produced email | apache at apache dot org |
Bug produced web | http://httpd.apache.org |
Bug affected | Apache web server prior 2.0.50 |
Bug not affected | Apache web servers newer than 2.0.50 or other web servers |
Bug vulnerability class | Denial Of Service |
Bug description | The remote host is running an Apache web server prior 2.0.50. The module mod_ssl is vulnerable to a denial of service attack. An attacker can cause a large consumation of CPU usage if closing a SSL connection on a specific situation. |
Bug solution | If the web server and/or ssh support is not used it should be de-installed or de-activated. Install the newest patch or bugfix to solve the problem or upgrade to the latest software version which is not vulnerable anymore. Additionally limit unwanted connections and communications with firewalling. |
Bug fixing time | Approx. 30 minutes |
Bug exploit availability | No |
Bug exploit url | http://www.securityfocus.com/bid/9826/exploit/ |
Bug remote | Yes |
Bug local | Yes |
Bug severity | Medium |
Bug popularity | 7 |
Bug simplicity | 6 |
Bug impact | 8 |
Bug risk | 7 |
Source CVE | CAN-2004-0748 |
Source SecurityFocus BID | 9826 |
Source Secunia ID | 12434 |
Source scipID | 821 |
Source ISS X-Force ID | 17200 |
Source RedHat Security Advisory ID | RHSA-2004-349 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://nagoya.apache.org/bugzilla/show_bug.cgi?id=29964 |