Apache does not filter terminal escape sequences from its error logs, which could make it easier for attackers to insert those sequences into terminal emulators containing vulnerabilities related to escape sequences.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0093.html - Broken Link | |
References | () http://frontal2.mandriva.com/security/advisories?name=MDKSA-2004:046 - Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=104612710031920&w=2 - Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=108369640424244&w=2 - Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=108437852004207&w=2 - Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=108731648532365&w=2 - Third Party Advisory | |
References | () http://security.gentoo.org/glsa/glsa-200405-22.xml - Third Party Advisory | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-101555-1 - Broken Link | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-57628-1 - Broken Link | |
References | () http://www.iss.net/security_center/static/11412.php - Broken Link | |
References | () http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:050 - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2003-082.html - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2003-083.html - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2003-104.html - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2003-139.html - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2003-243.html - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2003-244.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/9930 - Third Party Advisory, VDB Entry | |
References | () http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.529643 - Mailing List, Third Party Advisory | |
References | () http://www.trustix.org/errata/2004/0017 - Broken Link | |
References | () http://www.trustix.org/errata/2004/0027 - Broken Link | |
References | () https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100109 - Third Party Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A150 - Third Party Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4114 - Third Party Advisory |
06 Jun 2021, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2003-03-18 05:00
Updated : 2024-11-20 23:43
NVD link : CVE-2003-0020
Mitre link : CVE-2003-0020
CVE.ORG link : CVE-2003-0020
JSON object : View
Products Affected
apache
- http_server
CWE