7.8

CVE-2011-3192

Exploit

The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ApacheHTTP Server Version >= 2.0.35 < 2.0.65
ApacheHTTP Server Version >= 2.2.0 < 2.2.20
OpensuseOpensuse Version11.3
OpensuseOpensuse Version11.4
SuseLinux Enterprise Server Version10 Updatesp2 SwEdition-
SuseLinux Enterprise Server Version10 Updatesp3 SwEdition-
SuseLinux Enterprise Server Version10 Updatesp4 SwEdition-
SuseLinux Enterprise Server Version11 Updatesp1 SwPlatform-
SuseLinux Enterprise Server Version11 Updatesp1 SwPlatformvmware
CanonicalUbuntu Linux Version8.04 SwEdition-
CanonicalUbuntu Linux Version10.04 SwEdition-
CanonicalUbuntu Linux Version10.10
CanonicalUbuntu Linux Version11.04
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 92.84% 0.998
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.8 10 6.9
AV:N/AC:L/Au:N/C:N/I:N/A:C
CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

http://marc.info/?l=bugtraq&m=131551295528105&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://marc.info/?l=bugtraq&m=131731002122529&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://marc.info/?l=bugtraq&m=132033751509019&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://marc.info/?l=bugtraq&m=133951357207000&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://marc.info/?l=bugtraq&m=133477473521382&w=2
Third Party Advisory
Mailing List
Issue Tracking
http://seclists.org/fulldisclosure/2011/Aug/175
Third Party Advisory
Exploit
Mailing List
http://secunia.com/advisories/45606
Vendor Advisory
Not Applicable
http://securitytracker.com/id?1025960
Third Party Advisory
Broken Link
VDB Entry
http://www.exploit-db.com/exploits/17696
Third Party Advisory
Exploit
VDB Entry
http://www.kb.cert.org/vuls/id/405811
Third Party Advisory
US Government Resource
http://www.securityfocus.com/bid/49303
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=732928
Third Party Advisory
Exploit
Issue Tracking
https://issues.apache.org/bugzilla/show_bug.cgi?id=51714
Vendor Advisory
Exploit
Issue Tracking