Search for vulnerabilities
Vulnerability details: VCID-h6ud-vwcc-aaac
Vulnerability ID VCID-h6ud-vwcc-aaac
Aliases CVE-2005-2728
Summary The byte-range filter in Apache 2.0 before 2.0.54 allows remote attackers to cause a denial of service (memory consumption) via an HTTP header with a large Range field.
Status Published
Exploitability 2.0
Weighted Severity 8.0
Risk 10.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
rhas Important https://access.redhat.com/errata/RHSA-2005:608
epss 0.31799 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.31799 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.31799 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.31799 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.31799 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.31799 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.31799 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.31799 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.31799 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.31799 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.61794 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.61794 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.61794 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.61794 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.61794 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.61794 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.61794 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.61794 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.61794 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.61794 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.61794 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.61794 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.61794 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.61794 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.61794 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.61794 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.61794 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.61794 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.61794 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.65706 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.77631 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.77631 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.77631 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.77631 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.92697 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.92697 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.92697 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.92697 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.92697 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.92697 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.92697 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.92697 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.92697 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
epss 0.92697 https://api.first.org/data/v1/epss?cve=CVE-2005-2728
rhbs medium https://bugzilla.redhat.com/show_bug.cgi?id=1617753
apache_httpd moderate https://httpd.apache.org/security/json/CVE-2005-2728.json
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2005-2728
Reference id Reference type URL
ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U
http://issues.apache.org/bugzilla/show_bug.cgi?id=29962
http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-2728.json
https://api.first.org/data/v1/epss?cve=CVE-2005-2728
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2728
http://secunia.com/advisories/16559/
http://secunia.com/advisories/16705
http://secunia.com/advisories/16714
http://secunia.com/advisories/16743
http://secunia.com/advisories/16746
http://secunia.com/advisories/16753
http://secunia.com/advisories/16754
http://secunia.com/advisories/16769
http://secunia.com/advisories/16789
http://secunia.com/advisories/16956
http://secunia.com/advisories/17036
http://secunia.com/advisories/17288
http://secunia.com/advisories/17600
http://secunia.com/advisories/17831
http://secunia.com/advisories/17923
http://secunia.com/advisories/18161
http://secunia.com/advisories/18333
http://secunia.com/advisories/18517
http://secunia.com/advisories/19072
http://securityreason.com/securityalert/604
https://exchange.xforce.ibmcloud.com/vulnerabilities/22006
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10017
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1246
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1727
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A760
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1
http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
http://www.debian.org/security/2005/dsa-805
http://www.gentoo.org/security/en/glsa/glsa-200508-15.xml
http://www.mandriva.com/security/advisories?name=MDKSA-2005:161
http://www.novell.com/linux/security/advisories/2005_51_apache2.html
http://www.novell.com/linux/security/advisories/2005_52_apache2.html
http://www.redhat.com/support/errata/RHSA-2005-608.html
http://www.securityfocus.com/archive/1/428138/100/0/threaded
http://www.securityfocus.com/bid/14660
http://www.ubuntu.com/usn/usn-177-1
http://www.vupen.com/english/advisories/2006/0789
1617753 https://bugzilla.redhat.com/show_bug.cgi?id=1617753
326435 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=326435
cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*
CVE-2005-2728 https://httpd.apache.org/security/json/CVE-2005-2728.json
CVE-2005-2728 https://nvd.nist.gov/vuln/detail/CVE-2005-2728
GLSA-200508-15 https://security.gentoo.org/glsa/200508-15
RHSA-2005:608 https://access.redhat.com/errata/RHSA-2005:608
USN-177-1 https://usn.ubuntu.com/177-1/
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2005-2728
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.96428
EPSS Score 0.31799
Published At April 2, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
There are no relevant records.