Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
02 Feb 2024, 03:05
Type | Values Removed | Values Added |
---|---|---|
References | (SECTRACK) http://securitytracker.com/id?1011783 - Broken Link, Third Party Advisory, VDB Entry | |
References | () https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E - Mailing List, Patch | |
References | () https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E - Mailing List, Patch | |
References | (BID) http://www.securityfocus.com/bid/11471 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
References | (DEBIAN) http://www.debian.org/security/2004/dsa-594 - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E - Mailing List, Patch | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/17785 - Third Party Advisory, VDB Entry | |
References | (VUPEN) http://www.vupen.com/english/advisories/2006/0789 - Broken Link | |
References | () https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E - Mailing List, Patch | |
References | (SECUNIA) http://secunia.com/advisories/19073 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/12898/ - Broken Link | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2005-816.html - Broken Link | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2004-600.html - Broken Link | |
References | (OPENPKG) http://marc.info/?l=bugtraq&m=109906660225051&w=2 - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E - Mailing List, Patch | |
References | (CONFIRM) http://www.apacheweek.com/features/security-13 - Product | |
References | () https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E - Mailing List, Patch | |
References | () https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E - Mailing List, Patch | |
References | (CONFIRM) http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm - Third Party Advisory | |
References | (SUNALERT) http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1 - Broken Link | |
References | (MANDRAKE) http://www.mandriva.com/security/advisories?name=MDKSA-2004:134 - Third Party Advisory | |
CWE | CWE-131 | |
CVSS |
v2 : v3 : |
v2 : 6.9
v3 : 7.8 |
CPE | cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.7:*:dev:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.23:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.31:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.26:*:*:*:*:*:*:* cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.32:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.24:*:*:*:*:*:*:* cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.25:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.28:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.14:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.27:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.12:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:1.3.29:*:*:*:*:*:*:* |
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* |
07 Nov 2023, 01:56
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2005-02-09 05:00
Updated : 2024-02-28 10:42
NVD link : CVE-2004-0940
Mitre link : CVE-2004-0940
CVE.ORG link : CVE-2004-0940
JSON object : View
Products Affected
hp
- hp-ux
suse
- suse_linux
apache
- http_server
openpkg
- openpkg
slackware
- slackware_linux
trustix
- secure_linux
CWE
CWE-131
Incorrect Calculation of Buffer Size