CVE-2004-0700

Format string vulnerability in the mod_proxy hook functions function in ssl_engine_log.c in mod_ssl before 2.8.19 for Apache before 1.3.31 may allow remote attackers to execute arbitrary messages via format string specifiers in certain log messages for HTTPS that are handled by the ssl_log function.
References
Link Resource
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000857
http://marc.info/?l=apache-modssl&m=109001100906749&w=2
http://marc.info/?l=bugtraq&m=109005001205991&w=2
http://packetstormsecurity.org/0407-advisories/modsslFormat.txt
http://virulent.siyahsapka.org/
http://www.debian.org/security/2004/dsa-532
http://www.kb.cert.org/vuls/id/303448 Third Party Advisory US Government Resource
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:075
http://www.osvdb.org/7929
http://www.redhat.com/support/errata/RHSA-2004-405.html
http://www.redhat.com/support/errata/RHSA-2004-408.html
http://www.securityfocus.com/bid/10736
http://www.ubuntu.com/usn/usn-177-1
https://bugzilla.fedora.us/show_bug.cgi?id=1888
https://exchange.xforce.ibmcloud.com/vulnerabilities/16705
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000857
http://marc.info/?l=apache-modssl&m=109001100906749&w=2
http://marc.info/?l=bugtraq&m=109005001205991&w=2
http://packetstormsecurity.org/0407-advisories/modsslFormat.txt
http://virulent.siyahsapka.org/
http://www.debian.org/security/2004/dsa-532
http://www.kb.cert.org/vuls/id/303448 Third Party Advisory US Government Resource
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:075
http://www.osvdb.org/7929
http://www.redhat.com/support/errata/RHSA-2004-405.html
http://www.redhat.com/support/errata/RHSA-2004-408.html
http://www.securityfocus.com/bid/10736
http://www.ubuntu.com/usn/usn-177-1
https://bugzilla.fedora.us/show_bug.cgi?id=1888
https://exchange.xforce.ibmcloud.com/vulnerabilities/16705
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:mod_ssl:mod_ssl:2.3.11:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.4.7:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.4.8:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.4.9:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.4.10:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.8.1:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.8.1.2:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.8.2:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.8.3:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.8.4:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.8.5:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.8.5.1:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.8.5.2:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.8.6:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.8.7:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.8.8:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.8.9:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.8.10:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.8.12:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.8.14:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.8.15:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.8.16:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.8.17:*:*:*:*:*:*:*
cpe:2.3:a:mod_ssl:mod_ssl:2.8.18:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*

History

20 Nov 2024, 23:49

Type Values Removed Values Added
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000857 - () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000857 -
References () http://marc.info/?l=apache-modssl&m=109001100906749&w=2 - () http://marc.info/?l=apache-modssl&m=109001100906749&w=2 -
References () http://marc.info/?l=bugtraq&m=109005001205991&w=2 - () http://marc.info/?l=bugtraq&m=109005001205991&w=2 -
References () http://packetstormsecurity.org/0407-advisories/modsslFormat.txt - () http://packetstormsecurity.org/0407-advisories/modsslFormat.txt -
References () http://virulent.siyahsapka.org/ - () http://virulent.siyahsapka.org/ -
References () http://www.debian.org/security/2004/dsa-532 - () http://www.debian.org/security/2004/dsa-532 -
References () http://www.kb.cert.org/vuls/id/303448 - Third Party Advisory, US Government Resource () http://www.kb.cert.org/vuls/id/303448 - Third Party Advisory, US Government Resource
References () http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:075 - () http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:075 -
References () http://www.osvdb.org/7929 - () http://www.osvdb.org/7929 -
References () http://www.redhat.com/support/errata/RHSA-2004-405.html - () http://www.redhat.com/support/errata/RHSA-2004-405.html -
References () http://www.redhat.com/support/errata/RHSA-2004-408.html - () http://www.redhat.com/support/errata/RHSA-2004-408.html -
References () http://www.securityfocus.com/bid/10736 - () http://www.securityfocus.com/bid/10736 -
References () http://www.ubuntu.com/usn/usn-177-1 - () http://www.ubuntu.com/usn/usn-177-1 -
References () https://bugzilla.fedora.us/show_bug.cgi?id=1888 - () https://bugzilla.fedora.us/show_bug.cgi?id=1888 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16705 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16705 -

Information

Published : 2004-07-27 04:00

Updated : 2024-11-20 23:49


NVD link : CVE-2004-0700

Mitre link : CVE-2004-0700

CVE.ORG link : CVE-2004-0700


JSON object : View

Products Affected

mod_ssl

  • mod_ssl

gentoo

  • linux