Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2002-0839

Опубликовано: 11 окт. 2002
Источник: debian
EPSS Низкий

Описание

The shared memory scoreboard in the HTTP daemon for Apache 1.3.x before 1.3.27 allows any user running as the Apache UID to send a SIGUSR1 signal to any process as root, resulting in a denial of service (process kill) or possibly other behaviors that would not normally be allowed, by modifying the parent[].pid and parent[].last_rtime segments in the scoreboard.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
apachefixed1.3.27-0.1package
apache-perlfixed1.3.26-1.1-1.27-3-1package

EPSS

Процентиль: 34%
0.00137
Низкий

Связанные уязвимости

ubuntu
почти 23 года назад

Описание отсутствует

redhat
почти 23 года назад

The shared memory scoreboard in the HTTP daemon for Apache 1.3.x before 1.3.27 allows any user running as the Apache UID to send a SIGUSR1 signal to any process as root, resulting in a denial of service (process kill) or possibly other behaviors that would not normally be allowed, by modifying the parent[].pid and parent[].last_rtime segments in the scoreboard.

nvd
почти 23 года назад

The shared memory scoreboard in the HTTP daemon for Apache 1.3.x before 1.3.27 allows any user running as the Apache UID to send a SIGUSR1 signal to any process as root, resulting in a denial of service (process kill) or possibly other behaviors that would not normally be allowed, by modifying the parent[].pid and parent[].last_rtime segments in the scoreboard.

github
больше 3 лет назад

The shared memory scoreboard in the HTTP daemon for Apache 1.3.x before 1.3.27 allows any user running as the Apache UID to send a SIGUSR1 signal to any process as root, resulting in a denial of service (process kill) or possibly other behaviors that would not normally be allowed, by modifying the parent[].pid and parent[].last_rtime segments in the scoreboard.

EPSS

Процентиль: 34%
0.00137
Низкий