Vulnerabilities > CVE-2003-0134 - Unspecified vulnerability in Apache Http Server

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
apache
nessus

Summary

Unknown vulnerability in filestat.c for Apache running on OS2, versions 2.0 through 2.0.45, allows unknown attackers to cause a denial of service via requests related to device names.

Nessus

NASL familyWeb Servers
NASL idAPACHE_2_0_45_OS2.NASL
descriptionThe remote host appears to be running a version of Apache 2.0.x that is prior to 2.0.46 on OS/2. There is a vulnerability specific to such versions running on OS/2 in
last seen2020-06-01
modified2020-06-02
plugin id11607
published2003-05-08
reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/11607
titleApache 2.0.x < 2.0.46 on OS/2 filestat.c Device Name Request DoS
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if(description)
{
 script_id(11607);
 script_version("1.27");
 script_cvs_date("Date: 2018/11/15 20:50:25");

 script_bugtraq_id(7332);
 script_cve_id("CVE-2003-0134");

  script_name(english:"Apache 2.0.x < 2.0.46 on OS/2 filestat.c Device Name Request DoS");
  script_summary(english:"Checks for version of Apache");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server is affected by a remote denial of service
vulnerability." );
  script_set_attribute(attribute:"description", value:
"The remote host appears to be running a version of Apache 2.0.x that
is prior to 2.0.46 on OS/2. There is a vulnerability specific to such
versions running on OS/2 in 'filestat.c' that could allow an attacker
to disable this service remotely.

*** Note that Nessus solely relied on the version number
*** of the remote server to issue this warning. This might
*** be a false positive." );
  script_set_attribute(attribute:"solution", value:
"Upgrade to Apache web server version 2.0.46 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2003/Apr/21" );
  script_set_attribute(attribute:"see_also", value:"https://archive.apache.org/dist/httpd/CHANGES_2.0");

  script_set_attribute(attribute:"plugin_publication_date", value: "2003/05/08");
  script_set_attribute(attribute:"vuln_publication_date", value: "2003/04/02");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe",value:"cpe:/a:apache:http_server");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Web Servers");

  script_copyright(english:"This script is Copyright (C) 2003-2018 Tenable Network Security, Inc.");

  script_dependencie("apache_http_version.nasl", "no404.nasl");
  script_require_keys("installed_sw/Apache");
  script_require_ports("Services/www", 80);
  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("install_func.inc");

get_install_count(app_name:"Apache", exit_if_zero:TRUE);
port = get_http_port(default:80);
install = get_single_install(app_name:"Apache", port:port, exit_if_unknown_ver:TRUE);

source = get_kb_item_or_exit('www/apache/'+port+'/source', exit_code:1);
 
serv = strstr(source, "Server");
if(preg(pattern:"^Server:.*Apache(-AdvancedExtranetServer)?/2\.0\.([0-9][^0-9]|[0-3][0-9]|4[0-5]) .OS/2.", string:serv))
{
  security_warning(port);
  exit(0);
}
audit(AUDIT_LISTEN_NOT_VULN, "Apache", port, install["version"]);

Statements

contributorMark J Cox
lastmodified2008-07-02
organizationApache
statementFixed in Apache HTTP Server 2.0.46: http://httpd.apache.org/security/vulnerabilities_20.html

References