Vulnerability Details : CVE-2007-3303
Apache httpd 2.0.59 and 2.2.4, with the Prefork MPM module, allows local users to cause a denial of service via certain code sequences executed in a worker process that (1) stop request processing by killing all worker processes and preventing creation of replacements or (2) hang the system by forcing the master process to fork an arbitrarily large number of worker processes. NOTE: This might be an inherent design limitation of Apache with respect to worker processes in hosted environments.
Vulnerability category: Denial of service
Products affected by CVE-2007-3303
- cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*
Threat overview for CVE-2007-3303
Top countries where our scanners detected CVE-2007-3303
Top open port discovered on systems with this issue
80
IPs affected by CVE-2007-3303 11,100
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2007-3303!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2007-3303
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-3303
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:L/AC:L/Au:N/C:N/I:N/A:C |
3.9
|
6.9
|
NIST |
CWE ids for CVE-2007-3303
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
Vendor statements for CVE-2007-3303
-
Red Hat 2007-06-26Not a vulnerability. In the security model used by Apache httpd, the less-privileged child processes (running as the "apache" user) completely handle the servicing of new connections. Any local user who is able to run arbitrary code in those children is therefore able to prevent new requests from being serviced, by design. Such users will also be able to "simulate" server load and force the parent to create children up to the configured limits, by design.
-
Apache 2008-07-02In the security model used by Apache httpd, the less-privileged child processes completely handle the servicing of new connections. Any local user who is able to run arbitrary code in those children is therefore able to prevent new requests from being serviced, by design. Such users will also be able to "simulate" server load and force the parent to create children up to the configured limits, by design. A server with untrusted local users must be configured to use a solution like "suexec" if its required to allow the users to execute CGI (etc) scripts.
References for CVE-2007-3303
-
http://securityreason.com/securityalert/2814
Apache Prefork MPM vulnerabilities - Report - CXSecurity.com
-
http://security.psnc.pl/files/apache_report.pdf
-
http://www.securityfocus.com/bid/24215
-
http://www.securityfocus.com/archive/1/469899/100/0/threaded
-
http://www.securityfocus.com/archive/1/471832/100/0/threaded
Jump to