Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2002-0392 | First vendor Publication | 2002-07-03 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Apache 1.3 through 1.3.24, and Apache 2.0 through 2.0.36, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a chunk-encoded HTTP request that causes Apache to use an incorrect size. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0392 |
CPE : Common Platform Enumeration
SAINT Exploits
Description | Link |
---|---|
Apache chunked encoding buffer overflow | More info here |
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 131-1 (apache) File : nvt/deb_131_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 132-1 (apache-ssl) File : nvt/deb_132_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
838 | Apache HTTP Server Chunked Encoding Remote Overflow Apache Web Server contains a flaw that allows a remote attacker to execute arbitrary code. The issue is due to the mechanism that calculates the size of "chunked" encoding not properly interpreting the buffer size of data being transferred. By sending a specially crafted chunk of data, an attacker can possibly execute arbitrary code or crash the server. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-07-10 | Apache Chunked-Encoding worm attempt RuleID : 31405-community - Revision : 2 - Type : SERVER-APACHE |
2014-11-16 | Apache Chunked-Encoding worm attempt RuleID : 31405 - Revision : 2 - Type : SERVER-APACHE |
2014-01-10 | Apache Chunked-Encoding worm attempt RuleID : 1809-community - Revision : 19 - Type : SERVER-APACHE |
2014-01-10 | Apache Chunked-Encoding worm attempt RuleID : 1809 - Revision : 19 - Type : SERVER-APACHE |
2014-01-10 | apache chunked encoding memory corruption exploit attempt RuleID : 1808-community - Revision : 16 - Type : SERVER-WEBAPP |
2014-01-10 | apache chunked encoding memory corruption exploit attempt RuleID : 1808 - Revision : 16 - Type : SERVER-WEBAPP |
2014-01-10 | Chunked-Encoding transfer with no data attempt RuleID : 1807-community - Revision : 26 - Type : POLICY-OTHER |
2014-01-10 | Chunked-Encoding transfer with no data attempt RuleID : 1807 - Revision : 24 - Type : POLICY-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-09-22 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_32380.nasl - Type : ACT_GATHER_INFO |
2006-09-22 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_32423.nasl - Type : ACT_GATHER_INFO |
2006-09-22 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_33252.nasl - Type : ACT_GATHER_INFO |
2006-09-22 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_33253.nasl - Type : ACT_GATHER_INFO |
2006-09-22 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_33256.nasl - Type : ACT_GATHER_INFO |
2006-09-22 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_33257.nasl - Type : ACT_GATHER_INFO |
2006-09-22 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHSS_33280.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-131.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-132.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-133.nasl - Type : ACT_GATHER_INFO |
2004-09-18 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2002-039.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2002-126.nasl - Type : ACT_GATHER_INFO |
2002-06-17 | Name : The remote web server is vulnerable to a remote code execution attack. File : apache_chunked_encoding.nasl - Type : ACT_MIXED_ATTACK |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:23:54 |
|
2024-11-28 12:05:01 |
|
2023-11-07 21:48:12 |
|
2023-08-12 12:02:16 |
|
2023-08-12 01:01:12 |
|
2023-08-11 12:01:59 |
|
2023-08-11 01:01:13 |
|
2023-08-06 12:01:49 |
|
2023-08-06 01:01:13 |
|
2023-08-04 12:01:53 |
|
2023-08-04 01:01:13 |
|
2023-07-14 12:01:52 |
|
2023-07-14 01:01:13 |
|
2023-03-29 01:01:50 |
|
2023-03-28 12:01:18 |
|
2021-07-16 00:23:11 |
|
2021-06-06 17:23:05 |
|
2021-05-04 12:01:50 |
|
2021-04-22 01:01:58 |
|
2021-03-30 17:22:45 |
|
2020-05-23 13:16:43 |
|
2020-05-23 00:14:57 |
|
2019-08-16 12:01:06 |
|
2016-06-28 14:58:38 |
|
2016-04-26 12:08:41 |
|
2016-03-03 17:22:00 |
|
2016-03-03 13:21:22 |
|
2014-11-16 21:24:17 |
|
2014-07-10 21:23:08 |
|
2014-02-17 10:24:38 |
|
2014-01-19 21:21:40 |
|
2013-05-11 12:09:14 |
|