Vulnerability Note VU#132110

Apache HTTP Server vulnerable to DoS race condition in the handling of short-lived connections

Original Release date: 24 Mar 2004 | Last revised: 25 Aug 2004


A race condition exists in Apache 2 HTTP Server that may cause a denial-of-service condition on some platforms.


Apache HTTP Server versions 2.0.48 and prior contain a race condition in the handling of short-lived connections. According to the Apache anouncement, when using multiple listening sockets, a short-lived connection on a rarely-used socket may cause the child process to hold the accept mutex, blocking new connections from being served until another connection uses the socket.

This vulnerability does not affect Apache 2.x servers running on FreeBSD or Linux.


A denial-of-service situation may occur due the race condition until another connection is made the the socket.


This problem is resolved in Apache HTTP Server 2.0.49.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Apache Software FoundationAffected-24 Mar 2004
Sun Microsystems Inc.Affected-25 Aug 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to Apache Software Foundation for reporting this vulnerability.

This document was written by Jason A Rafail.

Other Information

  • CVE IDs: CAN-2004-0174
  • Date Public: 19 Mar 2004
  • Date First Published: 24 Mar 2004
  • Date Last Updated: 25 Aug 2004
  • Severity Metric: 3.37
  • Document Revision: 3


If you have feedback, comments, or additional information about this vulnerability, please send us email.