Overview
Apache Web Server contains a buffer overflow vulnerability in the mod_proxy module that may allow a remote attacker to execute arbitrary code or launch a denial of service (DoS) attack.
Description
The Apache Server is an open-source web server offered by The Apache Software Foundation. The Apache Server uses the mod_proxy module to implement proxying for various common protocols such as FTP and HTTP. In versions of Apache prior to and including 1.3.31-r2, the mod_proxy module contains a buffer overflow vulnerability located in the file proxy_util.c. To exploit this vulnerability an attacker must persuade an Apache server with mod_proxy enabled to connect to a malicious server configured to return an invalid content-length header. |
Impact
A remote attacker may be able to execute arbitrary code with the privileges of an Apache child process. Exploitation of this vulnerability may completely disable the Apache server resulting in a denial-of-service condition. |
Solution
Upgrade Apache |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported by Georgi Guninski.
This document was written by Jeff Gennari.
Other Information
CVE IDs: | CVE-2004-0492 |
Severity Metric: | 4.02 |
Date Public: | 2004-06-10 |
Date First Published: | 2004-10-19 |
Date Last Updated: | 2004-10-19 17:55 UTC |
Document Revision: | 108 |