CVE-2011-3192

EXPLOITED IN THE WILD

Apache HTTP Server < 2.0.65 - Denial of Service

Title source: rule

Description

The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.

Exploits (7)

exploitdb WORKING POC
by kingcope · perldosmultiple
https://www.exploit-db.com/exploits/17696
nomisec WORKING POC 14 stars
by tkisason · poc
https://github.com/tkisason/KillApachePy
nomisec WORKING POC
by futurezayka · dos
https://github.com/futurezayka/CVE-2011-3192
nomisec STUB
by stcmjp · poc
https://github.com/stcmjp/cve-2011-3192
vulncheck_xdb WORKING POC
dos
https://gitlab.com/ntkernel/KillApachePy
exploitdb WORKING POC
cdoslinux
https://www.exploit-db.com/exploits/18221
metasploit WORKING POC
by Kingcope, Masashi Fujiwara · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/http/apache_range_dos.rb

References (72)

... and 52 more

Scores

EPSS 0.9053
EPSS Percentile 99.6%

Details

VulnCheck KEV 2011-08-24
InTheWild.io 2021-06-06
CWE
CWE-400
Status published
Products (11)
apache/http_server 2.0.35 - 2.0.65
canonical/ubuntu_linux 8.04
canonical/ubuntu_linux 10.04
canonical/ubuntu_linux 10.10
canonical/ubuntu_linux 11.04
opensuse/opensuse 11.3
opensuse/opensuse 11.4
suse/linux_enterprise_server 10 sp2 (3 CPE variants)
suse/linux_enterprise_server 11 sp1 (2 CPE variants)
suse/linux_enterprise_software_development_kit 10 sp3 (2 CPE variants)
... and 1 more
Published Aug 29, 2011
Tracked Since Feb 18, 2026