Vulnerability Name:

CVE-2002-0839 (CCN-10280)

Assigned:2002-10-03
Published:2002-10-03
Updated:2021-06-06
Summary:The shared memory scoreboard in the HTTP daemon for Apache 1.3.x before 1.3.27 allows any user running as the Apache UID to send a SIGUSR1 signal to any process as root, resulting in a denial of service (process kill) or possibly other behaviors that would not normally be allowed, by modifying the parent[].pid and parent[].last_rtime segments in the scoreboard.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: SGI
Type: UNKNOWN
20021105-01-I

Source: BUGTRAQ
Type: UNKNOWN
20021015 GLSA: apache

Source: CCN
Type: Gentoo Linux Security Annoucement 2002-10-15 08:25 UTC
shared memory scoreboard vulnerabilities

Source: BUGTRAQ
Type: UNKNOWN
20021017 TSLSA-2002-0069-apache

Source: CCN
Type: iDEFENSE Security Advisory 10.03.2002
Apache 1.3.x shared memory scoreboard vulnerabilities

Source: VULNWATCH
Type: Patch, Vendor Advisory
20021003 iDEFENSE Security Advisory 10.03.2002: Apache 1.3.x shared memory scoreboard vulnerabilities

Source: MITRE
Type: CNA
CVE-2002-0839

Source: CONECTIVA
Type: UNKNOWN
CLA-2002:530

Source: CCN
Type: Conectiva Linux Announcement CLSA-2002:530
DoS and other vulnerabilities

Source: CCN
Type: Apache HTTP Server Project Web site
Welcome! - The Apache HTTP Server Project

Source: CONFIRM
Type: UNKNOWN
http://marc.info/?l=apache-httpd-announce&m=103367938230488&w=2

Source: BUGTRAQ
Type: UNKNOWN
20021003 [OpenPKG-SA-2002.009] OpenPKG Security Advisory (apache)

Source: HP
Type: UNKNOWN
SSRT090208

Source: HP
Type: UNKNOWN
HPSBUX0210-224

Source: CCN
Type: Oracle Security Alert #45
Security Release of Apache 1.3.27

Source: CCN
Type: RHSA-2002-222
Updated apache

Source: CCN
Type: RHSA-2002-248
apache

Source: CCN
Type: RHSA-2002-251
apache security update

Source: CCN
Type: RHSA-2003-106
Updated apache and mod_ssl packages available

Source: CCN
Type: Apache Web site
Apache 1.3.27 Released

Source: CCN
Type: ApacheWeek, Issue 311, 4th October 2002
Security Reports

Source: CONFIRM
Type: Vendor Advisory
http://www.apacheweek.com/issues/02-10-04

Source: CCN
Type: CIAC Information Bulletin N-005
Apache 1.3.27 HTTP Server Release

Source: DEBIAN
Type: UNKNOWN
DSA-187

Source: DEBIAN
Type: UNKNOWN
DSA-188

Source: DEBIAN
Type: UNKNOWN
DSA-195

Source: DEBIAN
Type: DSA-187
apache -- several vulnerabilities

Source: DEBIAN
Type: DSA-188
apache-ssl -- several vulnerabilities

Source: DEBIAN
Type: DSA-195
apache-perl -- several vulnerabilities

Source: XF
Type: Vendor Advisory
apache-scorecard-memory-overwrite(10280)

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2002:068

Source: ENGARDE
Type: UNKNOWN
ESA-20021007-024

Source: CCN
Type: SCO Security Advisory CSSA-2002-056.0
Linux: apache vulnerabilities in shared memory, DNS, and ApacheBench

Source: CCN
Type: SCO Security Advisory CSSA-2003-SCO.10.1
OpenServer 5.0.5 OpenServer 5.0.6 : Various security fixes for Apach

Source: CCN
Type: OpenPKG-SA-2002.009
Apache

Source: BID
Type: UNKNOWN
5884

Source: CCN
Type: BID-5884
Apache Web Server Scoreboard Memory Segment Overwriting SIGUSR1 Sending Vulnerability

Source: XF
Type: UNKNOWN
apache-scorecard-memory-overwrite(10280)

Source: MLIST
Type: UNKNOWN
[httpd-cvs] 20210330 svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html

Source: MLIST
Type: UNKNOWN
[httpd-cvs] 20210422 svn commit: r1074079 [2/3] - in /websites/staging/httpd/trunk/content: ./ apreq/ contribute/ contributors/ dev/ docs-project/ docs/ info/ mod_fcgid/ mod_ftp/ mod_mbox/ mod_smtpd/ modules/ security/ test/ test/flood/

Source: MLIST
Type: UNKNOWN
[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/

Source: MLIST
Type: UNKNOWN
[httpd-cvs] 20210330 svn commit: r1073149 [2/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/

Source: MLIST
Type: UNKNOWN
[httpd-cvs] 20210606 svn commit: r1075470 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html

Source: MLIST
Type: UNKNOWN
[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apache:http_server:1.3.26:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.19:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.20:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.24:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.25:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.22:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.23:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:apache:http_server:1.3.19:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.26:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.20:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.23:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.24:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.22:*:*:*:*:*:*:*
  • OR cpe:/a:apache:http_server:1.3.25:*:*:*:*:*:*:*
  • AND
  • cpe:/a:redhat:stronghold:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.debian:def:195
    V
    several vulnerabilities
    2002-11-13
    oval:org.debian:def:188
    V
    several vulnerabilities
    2002-11-05
    oval:org.debian:def:187
    V
    several vulnerabilities
    2002-11-04
    BACK
    apache http server 1.3.26
    apache http server 1.3.19
    apache http server 1.3.20
    apache http server 1.3.24
    apache http server 1.3.25
    apache http server 1.3.22
    apache http server 1.3.23
    apache http server 1.3.19
    apache http server 1.3.26
    apache http server 1.3.20
    apache http server 1.3.23
    apache http server 1.3.24
    apache http server 1.3.22
    apache http server 1.3.25
    redhat stronghold *
    redhat enterprise linux 2.1
    redhat linux advanced workstation 2.1