Описание
mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference.
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | released | 2.0.55-4ubuntu2.2 |
| devel | released | 2.2.4-3 |
| edgy | released | 2.0.55-4ubuntu4.1 |
| feisty | released | 2.2.3-3.2ubuntu0.1 |
| upstream | needs-triage |
Показывать по
EPSS
5.4 Medium
CVSS2
Связанные уязвимости
mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference.
mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference.
mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost ...
mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference.
EPSS
5.4 Medium
CVSS2