First published: Tue Oct 25 2005(Updated: )
Memory leak in the worker MPM (worker.c) for Apache 2, in certain circumstances, allows remote attackers to cause a denial of service (memory consumption) via aborted connections, which prevents the memory for the transaction pool from being reused for other connections.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server | >=2.0.36<2.0.55 | |
Ubuntu | =4.10 | |
Ubuntu | =5.04 | |
Ubuntu | =5.10 | |
redhat enterprise Linux desktop | =3.0 | |
redhat enterprise Linux desktop | =4.0 | |
redhat enterprise Linux server | =3.0 | |
redhat enterprise Linux server | =4.0 | |
redhat enterprise Linux workstation | =3.0 | |
redhat enterprise Linux workstation | =4.0 | |
Fedora Core | =4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2970 is classified as a medium severity vulnerability due to its potential to cause denial of service via memory leaks.
To fix CVE-2005-2970, it is recommended to upgrade to a patched version of Apache HTTP Server that addresses this memory leak issue.
CVE-2005-2970 affects Apache 2 versions between 2.0.36 and 2.0.55 and various Linux distributions such as Ubuntu and Red Hat.
CVE-2005-2970 allows remote attackers to conduct denial of service attacks through memory consumption caused by aborted connections.
Yes, using Apache 2 versions later than 2.0.55 mitigates the risks posed by CVE-2005-2970 as they contain fixes for the vulnerability.