CVE-2004-0700
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
27/07/2004
Last modified:
03/04/2025
Description
Format string vulnerability in the mod_proxy hook functions function in ssl_engine_log.c in mod_ssl before 2.8.19 for Apache before 1.3.31 may allow remote attackers to execute arbitrary messages via format string specifiers in certain log messages for HTTPS that are handled by the ssl_log function.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:mod_ssl:mod_ssl:2.3.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mod_ssl:mod_ssl:2.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mod_ssl:mod_ssl:2.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mod_ssl:mod_ssl:2.4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mod_ssl:mod_ssl:2.4.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mod_ssl:mod_ssl:2.4.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mod_ssl:mod_ssl:2.4.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mod_ssl:mod_ssl:2.4.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mod_ssl:mod_ssl:2.4.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mod_ssl:mod_ssl:2.4.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mod_ssl:mod_ssl:2.4.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mod_ssl:mod_ssl:2.4.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mod_ssl:mod_ssl:2.5.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mod_ssl:mod_ssl:2.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:mod_ssl:mod_ssl:2.6.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000857
- http://marc.info/?l=apache-modssl&m=109001100906749&w=2
- http://marc.info/?l=bugtraq&m=109005001205991&w=2
- http://packetstormsecurity.org/0407-advisories/modsslFormat.txt
- http://virulent.siyahsapka.org/
- http://www.debian.org/security/2004/dsa-532
- http://www.kb.cert.org/vuls/id/303448
- http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004%3A075
- http://www.osvdb.org/7929
- http://www.redhat.com/support/errata/RHSA-2004-405.html
- http://www.redhat.com/support/errata/RHSA-2004-408.html
- http://www.securityfocus.com/bid/10736
- http://www.ubuntu.com/usn/usn-177-1
- https://bugzilla.fedora.us/show_bug.cgi?id=1888
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16705
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000857
- http://marc.info/?l=apache-modssl&m=109001100906749&w=2
- http://marc.info/?l=bugtraq&m=109005001205991&w=2
- http://packetstormsecurity.org/0407-advisories/modsslFormat.txt
- http://virulent.siyahsapka.org/
- http://www.debian.org/security/2004/dsa-532
- http://www.kb.cert.org/vuls/id/303448
- http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004%3A075
- http://www.osvdb.org/7929
- http://www.redhat.com/support/errata/RHSA-2004-405.html
- http://www.redhat.com/support/errata/RHSA-2004-408.html
- http://www.securityfocus.com/bid/10736
- http://www.ubuntu.com/usn/usn-177-1
- https://bugzilla.fedora.us/show_bug.cgi?id=1888
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16705



