CVE-2003-1171

Heap-based buffer overflow in the sec_filter_out function in mod_security 1.7RC1 through 1.7.1 in Apache 2 allows remote attackers to execute arbitrary code via a server side script that sends a large amount of data.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mod_security:mod_security:1.7:*:*:*:*:*:*:*
cpe:2.3:a:mod_security:mod_security:1.7.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:46

Type Values Removed Values Added
References () http://adsystems.com.pl/adg-mod_security171.txt - () http://adsystems.com.pl/adg-mod_security171.txt -
References () http://secunia.com/advisories/10085 - Patch, Vendor Advisory () http://secunia.com/advisories/10085 - Patch, Vendor Advisory
References () http://securitytracker.com/id?1008025 - Exploit, Patch () http://securitytracker.com/id?1008025 - Exploit, Patch
References () http://www.modsecurity.org/download/CHANGES - () http://www.modsecurity.org/download/CHANGES -
References () http://www.securityfocus.com/archive/1/342767 - Patch () http://www.securityfocus.com/archive/1/342767 - Patch
References () http://www.securityfocus.com/bid/8919 - Patch () http://www.securityfocus.com/bid/8919 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/13543 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/13543 -

Information

Published : 2003-12-31 05:00

Updated : 2024-11-20 23:46


NVD link : CVE-2003-1171

Mitre link : CVE-2003-1171

CVE.ORG link : CVE-2003-1171


JSON object : View

Products Affected

mod_security

  • mod_security