First published: Sat Oct 05 2002(Updated: )
The shared memory scoreboard in the HTTP daemon for Apache 1.3.x before 1.3.27 allows any user running as the Apache UID to send a SIGUSR1 signal to any process as root, resulting in a denial of service (process kill) or possibly other behaviors that would not normally be allowed, by modifying the parent[].pid and parent[].last_rtime segments in the scoreboard.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server | >=1.3.0<1.3.27 | |
Debian Linux | =2.2 | |
Debian Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0839 is considered a high severity vulnerability due to its potential for denial of service and unauthorized process control.
To fix CVE-2002-0839, upgrade to Apache HTTP Server version 1.3.27 or later.
CVE-2002-0839 affects Apache HTTP Server 1.3.x versions before 1.3.27, including related Debian Linux distributions.
If exploited, CVE-2002-0839 allows an attacker to send a SIGUSR1 signal to processes running as root, potentially causing a denial of service.
Versions of Apache HTTP Server from 1.3.0 up to but not including 1.3.27 are vulnerable to CVE-2002-0839.