CVE-2004-0940
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
09/02/2005
Last modified:
03/04/2025
Description
Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
6.90
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* | 1.3 (including) | 1.3.32 (including) |
cpe:2.3:a:openpkg:openpkg:2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:openpkg:openpkg:2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:openpkg:openpkg:2.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:* | ||
cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:* | ||
cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:* | ||
cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:* | ||
cpe:2.3:o:slackware:slackware_linux:8.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:slackware:slackware_linux:8.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:* | ||
cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://marc.info/?l=bugtraq&m=109906660225051&w=2
- http://secunia.com/advisories/12898/
- http://secunia.com/advisories/19073
- http://securitytracker.com/id?1011783=
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1
- http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
- http://www.apacheweek.com/features/security-13
- http://www.debian.org/security/2004/dsa-594
- http://www.mandriva.com/security/advisories?name=MDKSA-2004%3A134
- http://www.redhat.com/support/errata/RHSA-2004-600.html
- http://www.redhat.com/support/errata/RHSA-2005-816.html
- http://www.securityfocus.com/bid/11471
- http://www.vupen.com/english/advisories/2006/0789
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17785
- https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
- http://marc.info/?l=bugtraq&m=109906660225051&w=2
- http://secunia.com/advisories/12898/
- http://secunia.com/advisories/19073
- http://securitytracker.com/id?1011783=
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1
- http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
- http://www.apacheweek.com/features/security-13
- http://www.debian.org/security/2004/dsa-594
- http://www.mandriva.com/security/advisories?name=MDKSA-2004%3A134
- http://www.redhat.com/support/errata/RHSA-2004-600.html
- http://www.redhat.com/support/errata/RHSA-2005-816.html
- http://www.securityfocus.com/bid/11471
- http://www.vupen.com/english/advisories/2006/0789
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17785
- https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E
- https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E