Описание
mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 2.0.55-4ubuntu2.2 |
devel | released | 2.2.4-3 |
edgy | released | 2.0.55-4ubuntu4.1 |
feisty | released | 2.2.3-3.2ubuntu0.1 |
upstream | needs-triage |
Показывать по
5.4 Medium
CVSS2
Связанные уязвимости
mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference.
mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference.
mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost ...
mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference.
5.4 Medium
CVSS2