5

CVE-2007-1863

cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.

Data is provided by the National Vulnerability Database (NVD)
ApplemacOS X Server Version10.0
ApplemacOS X Server Version10.1
ApplemacOS X Server Version10.1.1
ApplemacOS X Server Version10.1.2
ApplemacOS X Server Version10.1.3
ApplemacOS X Server Version10.1.4
ApplemacOS X Server Version10.1.5
ApplemacOS X Server Version10.2
ApplemacOS X Server Version10.2.1
ApplemacOS X Server Version10.2.2
ApplemacOS X Server Version10.2.3
ApplemacOS X Server Version10.2.4
ApplemacOS X Server Version10.2.5
ApplemacOS X Server Version10.2.6
ApplemacOS X Server Version10.2.7
ApplemacOS X Server Version10.2.8
ApplemacOS X Server Version10.3
ApplemacOS X Server Version10.3.1
ApplemacOS X Server Version10.3.2
ApplemacOS X Server Version10.3.3
ApplemacOS X Server Version10.3.4
ApplemacOS X Server Version10.3.5
ApplemacOS X Server Version10.3.6
ApplemacOS X Server Version10.3.7
ApplemacOS X Server Version10.3.8
ApplemacOS X Server Version10.3.9
ApplemacOS X Server Version10.4
ApplemacOS X Server Version10.4.1
ApplemacOS X Server Version10.4.2
ApplemacOS X Server Version10.4.3
ApplemacOS X Server Version10.4.4
ApplemacOS X Server Version10.4.5
ApplemacOS X Server Version10.4.6
ApplemacOS X Server Version10.4.7
ApplemacOS X Server Version10.4.8
ApplemacOS X Server Version10.4.9
ApacheHTTP Server Version >= 2.0.37 < 2.0.61
ApacheHTTP Server Version >= 2.2.0 < 2.2.6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 34.51% 0.969
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P
http://www.vupen.com/english/advisories/2007/3386
Third Party Advisory
Permissions Required
http://www.vupen.com/english/advisories/2008/1697
Third Party Advisory
Permissions Required
http://www.vupen.com/english/advisories/2007/2727
Third Party Advisory
Permissions Required
http://rhn.redhat.com/errata/RHSA-2007-0556.html
Third Party Advisory
VDB Entry
http://www.ubuntu.com/usn/usn-499-1
Third Party Advisory
VDB Entry
http://www.vupen.com/english/advisories/2007/3283
Third Party Advisory
Permissions Required
http://www.vupen.com/english/advisories/2008/0233
Third Party Advisory
Permissions Required
http://www.securityfocus.com/bid/24649
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id?1018303
Third Party Advisory
VDB Entry