Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
20 Nov 2024, 23:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=109906660225051&w=2 - Mailing List, Third Party Advisory | |
References | () http://secunia.com/advisories/12898/ - Broken Link | |
References | () http://secunia.com/advisories/19073 - Broken Link | |
References | () http://securitytracker.com/id?1011783 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1 - Broken Link | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm - Third Party Advisory | |
References | () http://www.apacheweek.com/features/security-13 - Product | |
References | () http://www.debian.org/security/2004/dsa-594 - Mailing List, Third Party Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2004:134 - Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2004-600.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2005-816.html - Broken Link | |
References | () http://www.securityfocus.com/bid/11471 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/0789 - Broken Link | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/17785 - Third Party Advisory, VDB Entry | |
References | () https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E - Mailing List, Patch | |
References | () https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E - Mailing List, Patch | |
References | () https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E - Mailing List, Patch | |
References | () https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E - Mailing List, Patch | |
References | () https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E - Mailing List, Patch | |
References | () https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E - Mailing List, Patch | |
References | () https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E - Mailing List, Patch |
02 Feb 2024, 03:05
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:* cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:* cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:* cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:* cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:* cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:* cpe:2.3:o:slackware:slackware_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:slackware:slackware_linux:8.1:*:*:*:*:*:*:* cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:* cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:* cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:* cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:* cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:* cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:* cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:* cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:* cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:* |
06 Jun 2021, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2005-02-09 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2004-0940
Mitre link : CVE-2004-0940
CVE.ORG link : CVE-2004-0940
JSON object : View
Products Affected
suse
- suse_linux
apache
- http_server
hp
- hp-ux
trustix
- secure_linux
slackware
- slackware_linux
openpkg
- openpkg
CWE
CWE-131
Incorrect Calculation of Buffer Size