PT-2004-1967 · Apache · Apache +1
Published
2004-10-21
·
Updated
2024-02-02
·
CVE-2004-0940
6.9
Medium
Base vector | Vector | AV:L/AC:M/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions:
Apache versions 1.3.x through 1.3.32
Description:
The issue is related to a buffer overflow in the get tag function in mod include, which allows local users who can create SSI documents to execute arbitrary code as the apache user. This can be achieved via SSI (XSSI) documents that trigger a length calculation error, potentially allowing a local user to gain the privileges of an httpd child.
Recommendations:
For Apache versions 1.3.x through 1.3.32, consider disabling the mod include module until a patch is available to prevent exploitation of the buffer overflow vulnerability. Restrict access to creating SSI documents to minimize the risk of arbitrary code execution.
Exploit
Fix
Weakness Enumeration
Related Identifiers
Affected Products
References · 26
- 🔥 https://exploit-db.com/exploits/587 · Exploit
- 🔥 https://exploit-db.com/exploits/24694 · Exploit
- 🔥 http://securityfocus.com/bid/11471 · Exploit
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1 · Vendor Advisory
- https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E · Patch
- http://redhat.com/support/errata/RHSA-2005-816.html · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2004-0940 · Security Note
- https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E · Patch
- http://redhat.com/support/errata/RHSA-2004-600.html · Vendor Advisory
- https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E · Patch
- http://marc.info/?l=bugtraq&m=109906660225051&w=2 · Vendor Advisory
- https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E · Patch
- https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E · Patch
- http://debian.org/security/2004/dsa-594 · Vendor Advisory
- https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E · Patch