{"vuid":"VU#979793","idnumber":"979793","name":"Apache vulnerable to DoS via request for MS-DOS device","keywords":["Apache","DoS","denial of service","MS-DOS device"],"overview":"Systems running the Apache web server under some versions of Microsoft Windows may be vulnerable to a remote denial-of-service condition.","clean_desc":"The Apache HTTP server fails to filter GET requests for MS-DOS style device names. This results in a denial-of-service vulnerability on systems running Apache under operating systems that use these device names (i.e., Microsoft Windows 95, Windows 98, and Windows Millenium Edition).","impact":"Remote intruders can cause the Apache server program to crash.","resolution":"Apply a patch from the vendor The Apache Software Foundation has released version 2.0.44 of the Apache HTTP server to address this vulnerability. Users are encouraged to upgrade to this version of the software. Furthermore, users of the Microsoft Windows 95, Windows 98, and Windows 98 Second Edition operating systems are encouraged to apply the patches referenced in Microsoft Security Bulletin MS00-017 in order to prevent other applications from exploiting this vulnerability.","workarounds":"","sysaffected":"","thanks":"Thanks to Matthew Murphy for reporting this vulnerability.","author":"This document was written by Chad R Dougherty.","public":["h","t","t","p",":","/","/","w","w","w",".","m","i","c","r","o","s","o","f","t",".","c","o","m","/","t","e","c","h","n","e","t","/","s","e","c","u","r","i","t","y","/","b","u","l","l","e","t","i","n","/","M","S","0","0","-","0","1","7",".","a","s","p"],"cveids":["CVE-2003-0016"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-12-09T22:10:44Z","publicdate":"2003-01-21T00:00:00Z","datefirstpublished":"2003-02-12T15:37:04Z","dateupdated":"2003-02-12T15:37:07Z","revision":16,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"1","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"4","cam_impact":"3","cam_easeofexploitation":"19","cam_attackeraccessrequired":"20","cam_scorecurrent":"0.4275","cam_scorecurrentwidelyknown":"2.052","cam_scorecurrentwidelyknownexploited":"3.762","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.4275,"vulnote":null}