CVE-2011-3192

EXPLOITED IN THE WILD

Apache HTTP Server < 2.0.65 - Denial of Service

Title source: rule

Description

The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.

Exploits (7)

nomisec WORKING POC 14 stars
by tkisason · poc
https://github.com/tkisason/KillApachePy
nomisec WORKING POC
by futurezayka · dos
https://github.com/futurezayka/CVE-2011-3192
nomisec STUB
by stcmjp · poc
https://github.com/stcmjp/cve-2011-3192
exploitdb WORKING POC
cdoslinux
https://www.exploit-db.com/exploits/18221
vulncheck_xdb WORKING POC
dos
https://gitlab.com/ntkernel/KillApachePy
exploitdb WORKING POC
by kingcope · perldosmultiple
https://www.exploit-db.com/exploits/17696
metasploit WORKING POC
by Kingcope, Masashi Fujiwara · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/http/apache_range_dos.rb

References (72)

... and 52 more

Scores

EPSS 0.9046
EPSS Percentile 99.6%

Exploitation Intel

VulnCheck KEV 2011-08-24
InTheWild.io 2021-06-06

Classification

CWE
CWE-400
Status draft

Affected Products (15)

apache/http_server < 2.0.65
opensuse/opensuse
opensuse/opensuse
suse/linux_enterprise_server
suse/linux_enterprise_server
suse/linux_enterprise_server
suse/linux_enterprise_server
suse/linux_enterprise_server
suse/linux_enterprise_software_development_kit
suse/linux_enterprise_software_development_kit
suse/linux_enterprise_software_development_kit
canonical/ubuntu_linux
canonical/ubuntu_linux
canonical/ubuntu_linux
canonical/ubuntu_linux

Timeline

Published Aug 29, 2011
Tracked Since Feb 18, 2026