mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost with access control and a custom error 400 error page, allows remote attackers to cause a denial of service (application crash) via a non-SSL request to an SSL port, which triggers a NULL pointer dereference.
Published 2005-12-31 05:00:00
Updated 2023-02-13 02:15:44
Source Red Hat, Inc.
View at NVD,   CVE.org
Vulnerability category: Memory CorruptionDenial of service

Products affected by CVE-2005-3357

Threat overview for CVE-2005-3357

Top countries where our scanners detected CVE-2005-3357
Top open port discovered on systems with this issue 80
IPs affected by CVE-2005-3357 137,839
Threat actors abusing to this issue? Yes
Find out if you* are affected by CVE-2005-3357!
*Directly or indirectly through your vendors, service providers and 3rd parties. Powered by attack surface intelligence from SecurityScorecard.

Exploit prediction scoring system (EPSS) score for CVE-2005-3357

97.26%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2005-3357

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
5.4
MEDIUM AV:N/AC:H/Au:N/C:N/I:N/A:C
4.9
6.9
NIST

CWE ids for CVE-2005-3357

  • Assigned by: nvd@nist.gov (Primary)

Vendor statements for CVE-2005-3357

  • Apache 2008-07-02
    Fixed in Apache HTTP Server 2.2.2 and 2.0.58 http://httpd.apache.org/security/vulnerabilities_22.html http://httpd.apache.org/security/vulnerabilities_20.html

References for CVE-2005-3357

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!