CVE-2004-0492

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.

References

http://www.debian.org/security/2004/dsa-525

http://rhn.redhat.com/errata/RHSA-2004-245.html

http://seclists.org/lists/fulldisclosure/2004/Jun/0296.html

http://www.guninski.com/modproxy1.html

https://bugzilla.fedora.us/show_bug.cgi?id=1737

ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.asc

http://www.kb.cert.org/vuls/id/541310

http://secunia.com/advisories/11841

http://sunsolve.sun.com/search/document.do?assetkey=1-26-57628-1

http://sunsolve.sun.com/search/document.do?assetkey=1-26-101555-1

http://sunsolve.sun.com/search/document.do?assetkey=1-26-101841-1

http://www.mandriva.com/security/advisories?name=MDKSA-2004:065

http://marc.info/?l=bugtraq&m=130497311408250&w=2

http://marc.info/?l=bugtraq&m=108711172710140&w=2

https://exchange.xforce.ibmcloud.com/vulnerabilities/16387

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4863

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100112

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

Details

Source: MITRE

Published: 2004-08-06

Updated: 2021-06-06

Risk Information

CVSS v2

Base Score: 10

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 10

Severity: HIGH

Tenable Plugins

View all (15 total)

IDNameProductFamilySeverity
36428FreeBSD : apache -- heap overflow in mod_proxy (ca6c8f35-0a5f-11d9-ad6f-00061bc2ad93)NessusFreeBSD Local Security Checks
critical
18793Slackware 10.0 / 8.1 / 9.0 / 9.1 / current : apache, mod_ssl, php (SSA:2004-299-01)NessusSlackware Local Security Checks
critical
15898Mac OS X Multiple Vulnerabilities (Security Update 2004-12-02)NessusMacOS X Local Security Checks
high
15555Apache mod_proxy Content-Length OverflowNessusWeb Servers
critical
15483Solaris 8 (x86) : 116974-07NessusSolaris Local Security Checks
critical
15482Solaris 8 (sparc) : 116973-07NessusSolaris Local Security Checks
critical
15362Debian DSA-525-1 : apache - buffer overflowNessusDebian Local Security Checks
critical
14845FreeBSD : apache -- heap overflow in mod_proxy (10)NessusFreeBSD Local Security Checks
critical
2274Mac OS X Multiple Vulnerabilities (Security Update 2004-09-07)Nessus Network MonitorWeb Clients
medium
14527GLSA-200406-16 : Apache 1.3: Buffer overflow in mod_proxyNessusGentoo Local Security Checks
critical
14164Mandrake Linux Security Advisory : apache (MDKSA-2004:065)NessusMandriva Local Security Checks
critical
13593Solaris 9 (x86) : 114145-12NessusSolaris Local Security Checks
critical
13530Solaris 9 (sparc) : 113146-13NessusSolaris Local Security Checks
critical
12506RHEL 2.1 : apache, mod_ssl (RHSA-2004:245)NessusRed Hat Local Security Checks
critical
800802Mac OS X Multiple Vulnerabilities (Security Update 2004-09-07)Log Correlation EngineOperating System Detection
high