CVE-2012-0031 — scoreboard
scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an inval
Published
2012-01-18T20:00:00.000Z
Last modified
2024-08-06T18:09:17.303Z
01What is this vulnerability?
scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.
02Affected products
| Vendor | Product | Versions |
|---|
| n | a / n/a | n/a |
03Active exploitation status
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
04Recommended remediation
- Patch to a fixed version listed in the vendor advisory (see references below).
- Mitigate with WAF rules, network egress filters, or feature flags where the patch is not yet available.
- Hunt historical logs for exploitation indicators — see Detection signatures below.
05Technical details
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
06Detection signatures
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
Open in Sigma generator →
07Related CVEs
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.
08Timeline
- Published: 2012-01-18T20:00:00.000Z
- Last modified: 2024-08-06T18:09:17.303Z
09References
- secunia.com — http://secunia.com/advisories/47410
- h20000.www2.hp.com — http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
- marc.info — http://marc.info/?l=bugtraq&m=134987041210674&w=2
- www.mandriva.com — http://www.mandriva.com/security/advisories?name=MDVSA-2012:012
- rhn.redhat.com — http://rhn.redhat.com/errata/RHSA-2012-0543.html
- svn.apache.org — http://svn.apache.org/viewvc?view=revision&revision=1230065
- www.securityfocus.com — http://www.securityfocus.com/bid/51407
- marc.info — http://marc.info/?l=bugtraq&m=134987041210674&w=2
- marc.info — http://marc.info/?l=bugtraq&m=133294460209056&w=2
- rhn.redhat.com — http://rhn.redhat.com/errata/RHSA-2012-0128.html
- marc.info — http://marc.info/?l=bugtraq&m=133294460209056&w=2
- rhn.redhat.com — http://rhn.redhat.com/errata/RHSA-2012-0542.html
- lists.apple.com — http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
- support.apple.com — http://support.apple.com/kb/HT5501
- www.oracle.com — http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html
- bugzilla.redhat.com — https://bugzilla.redhat.com/show_bug.cgi?id=773744
- h20000.www2.hp.com — http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041
- marc.info — http://marc.info/?l=bugtraq&m=133494237717847&w=2
- lists.opensuse.org — http://lists.opensuse.org/opensuse-security-announce/2012-02/msg00026.html
- www.mandriva.com — http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
- secunia.com — http://secunia.com/advisories/48551
- www.debian.org — http://www.debian.org/security/2012/dsa-2405
- marc.info — http://marc.info/?l=bugtraq&m=133494237717847&w=2
- lists.opensuse.org — http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00002.html
- www.halfdog.net — http://www.halfdog.net/Security/2011/ApacheScoreboardInvalidFreeOnShutdown/
- lists.apache.org — https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e0593…
- lists.apache.org — https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181e…
- lists.apache.org — https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772…
- lists.apache.org — https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f74…
- lists.apache.org — https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d65…
Want this in your SOAR or SIEM?
SARA's API returns EPSS, CVSS, KEV, and an analyst-grade summary in one call.
Read the API reference →