MEDIUM
Buffer overflow in Apache 2.0.50 and earlier allows local users to gain apache privileges via a .htaccess file that causes the overflow during expansion of environment variables.
http://secunia.com/advisories/12540
http://secunia.com/advisories/34920
http://securitytracker.com/id?1011303
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=205147
http://www.gentoo.org/security/en/glsa/glsa-200409-21.xml
http://www.kb.cert.org/vuls/id/481998
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:096
http://www.novell.com/linux/security/advisories/2004_32_apache2.html
http://www.redhat.com/support/errata/RHSA-2004-463.html
http://www.trustix.org/errata/2004/0047/
http://www.vupen.com/english/advisories/2009/1233
https://exchange.xforce.ibmcloud.com/vulnerabilities/17384
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11561
Source: MITRE
Published: 2004-10-20
Updated: 2017-10-11
Type: NVD-CWE-Other
Base Score: 4.6
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 3.9
Severity: MEDIUM