Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
http://www.securityfocus.com/bid/11471
http://www.debian.org/security/2004/dsa-594
http://www.redhat.com/support/errata/RHSA-2004-600.html
http://www.apacheweek.com/features/security-13
http://securitytracker.com/id?1011783
http://secunia.com/advisories/12898/
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1
http://secunia.com/advisories/19073
http://www.redhat.com/support/errata/RHSA-2005-816.html
http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
http://www.mandriva.com/security/advisories?name=MDKSA-2004:134
http://www.vupen.com/english/advisories/2006/0789
http://marc.info/?l=bugtraq&m=109906660225051&w=2
https://exchange.xforce.ibmcloud.com/vulnerabilities/17785
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E