CVE-2004-0493 (CNNVD-200408-043)
中文标题:
Apache 安全漏洞
英文标题:
The ap_get_mime_headers_core function in Apache httpd 2.0.49 allows remote attackers to cause a deni...
漏洞描述
中文描述:
Apache是一款开放源代码流行的Web服务程序。Apache ap_escape_html内存分配存在问题,远程攻击者可以利用这个漏洞对Apache服务程序进行拒绝服务攻击。问题存在于server/protocol.c ap_get_mime_headers_core:------ if (last_field != NULL) { if ((len > 0) && ((*field == ' ') || *field == ' ')) {...fold_buf = (char *)apr_palloc(r->pool, alloc_len);-----如果头字段以TAB或SPACE开始,Apache就会分配内存给它。而在ap_escape_html(r->pool, last_field)函数中,last_field字段可以任意长,根据如下代码:----int i, j;for (i = 0, j = 0; s[i] != ''; i++) if (s[i] == '<' || s[i] == '>') j += 3; else if (s[i] == '&') j += 4; if (j == 0) return apr_pstrmemdup(p, s, i); x = apr_palloc(p, i + j + 1);----(i + j + 1)也可以是任意长度,导致分配任意内存,可消耗大量资源。在linux x86_64上证实发送820MB数据可以溢出(i+j+1),导致memcpy崩溃而引起拒绝服务。
英文描述:
The ap_get_mime_headers_core function in Apache httpd 2.0.49 allows remote attackers to cause a denial of service (memory exhaustion), and possibly an integer signedness error leading to a heap-based buffer overflow on 64 bit systems, via long header lines with large numbers of space or tab characters.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| avaya | converged_communications_server | 2.0 | - | - |
cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*
|
| gentoo | linux | 1.4 | - | - |
cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*
|
| trustix | secure_linux | 1.5 | - | - |
cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
|
| trustix | secure_linux | 2.0 | - | - |
cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
|
| trustix | secure_linux | 2.1 | - | - |
cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.47 | - | - |
cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.48 | - | - |
cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.49 | - | - |
cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*
|
| ibm | http_server | 2.0.42 | - | - |
cpe:2.3:a:ibm:http_server:2.0.42:*:*:*:*:*:*:*
|
| ibm | http_server | 2.0.42.1 | - | - |
cpe:2.3:a:ibm:http_server:2.0.42.1:*:*:*:*:*:*:*
|
| ibm | http_server | 2.0.42.2 | - | - |
cpe:2.3:a:ibm:http_server:2.0.42.2:*:*:*:*:*:*:*
|
| ibm | http_server | 2.0.47 | - | - |
cpe:2.3:a:ibm:http_server:2.0.47:*:*:*:*:*:*:*
|
| ibm | http_server | 2.0.47.1 | - | - |
cpe:2.3:a:ibm:http_server:2.0.47.1:*:*:*:*:*:*:*
|
| avaya | s8300 | r2.0.0 | - | - |
cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*
|
| avaya | s8500 | r2.0.0 | - | - |
cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*
|
| avaya | s8700 | r2.0.0 | - | - |
cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
cve.org
exploitdb
exploitdb
CVSS评分详情
AV:N/AC:L/Au:N/C:N/I:P/A:P
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2004-0493 |
2025-11-11 15:17:29 | 2025-11-11 07:32:21 |
| NVD | nvd_CVE-2004-0493 |
2025-11-11 14:50:54 | 2025-11-11 07:41:07 |
| CNNVD | cnnvd_CNNVD-200408-043 |
2025-11-11 15:08:44 | 2025-11-11 07:48:53 |
| EXPLOITDB | exploitdb_EDB-360 |
2025-11-11 15:05:27 | 2025-11-11 08:32:32 |
| EXPLOITDB | exploitdb_EDB-371 |
2025-11-11 15:05:24 | 2025-11-11 08:34:13 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 27 -> 29
- tags_count: 4 -> 6
查看详细变更
- references_count: 24 -> 27
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-200408-043
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 6.4
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:N/I:P/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 16
- data_sources: ['cve'] -> ['cve', 'nvd']