CVE-2004-0940

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.

References

http://www.securityfocus.com/bid/11471

http://www.debian.org/security/2004/dsa-594

http://www.redhat.com/support/errata/RHSA-2004-600.html

http://www.apacheweek.com/features/security-13

http://securitytracker.com/id?1011783

http://secunia.com/advisories/12898/

http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1

http://secunia.com/advisories/19073

http://www.redhat.com/support/errata/RHSA-2005-816.html

http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm

http://www.mandriva.com/security/advisories?name=MDKSA-2004:134

http://www.vupen.com/english/advisories/2006/0789

http://marc.info/?l=bugtraq&m=109906660225051&w=2

https://exchange.xforce.ibmcloud.com/vulnerabilities/17785

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E

Details

Source: MITRE

Published: 2005-02-09

Updated: 2021-06-06

Type: CWE-119

Risk Information

CVSS v2

Base Score: 6.9

Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.4

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.24:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.25:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.32:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:*

cpe:2.3:a:openpkg:openpkg:current:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.28:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.29:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*

cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.23:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.27:*:*:*:*:*:*:*

cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.31:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.7:*:dev:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.26:*:*:*:*:*:*:*

cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*

cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*

cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*

cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*

cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*

cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*

cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*

cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*

cpe:2.3:o:slackware:slackware_linux:8.1:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*

cpe:2.3:o:slackware:slackware_linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*

cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*

Tenable Plugins

View all (11 total)

IDNameProductFamilySeverity
37841FreeBSD : apache mod_include buffer overflow vulnerability (6e6a6b8a-2fde-11d9-b3a2-0050fc56d258)NessusFreeBSD Local Security Checks
medium
18788Slackware 10.0 / 8.1 / 9.0 / 9.1 / current : apache+mod_ssl (SSA:2004-305-01)NessusSlackware Local Security Checks
medium
15960RHEL 2.1 : apache, mod_ssl (RHSA-2004:600)NessusRed Hat Local Security Checks
high
2444Mac OS X Multiple Vulnerabilities (Security Update 2004-12-02)Nessus Network MonitorWeb Clients
high
15898Mac OS X Multiple Vulnerabilities (Security Update 2004-12-02)NessusMacOS X Local Security Checks
high
15797FreeBSD : apache mod_include buffer overflow vulnerability (11)NessusFreeBSD Local Security Checks
medium
15739Mandrake Linux Security Advisory : apache (MDKSA-2004:134)NessusMandriva Local Security Checks
medium
15729Debian DSA-594-1 : apache - buffer overflowsNessusDebian Local Security Checks
medium
15606GLSA-200411-03 : Apache 1.3: Buffer overflow vulnerability in mod_includeNessusGentoo Local Security Checks
medium
15554Apache mod_include get_tag() Function Local OverflowNessusWeb Servers
medium
800800Mac OS X Multiple Vulnerabilities (Security Update 2004-12-02)Log Correlation EngineOperating System Detection
medium