7.8
CVSSv3

CVE-2002-0653

Published: 11/07/2002 Updated: 02/02/2024
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 465
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Off-by-one buffer overflow in the ssl_compat_directive function, as called by the rewrite_command hook for mod_ssl Apache module 2.8.9 and previous versions, allows local users to execute arbitrary code as the Apache server user via .htaccess files with long entries.

Vulnerable Product Search on Vulmon Subscribe to Product

modssl mod ssl

Vendor Advisories

The libapache-mod-ssl package provides SSL capability to the apache webserver Recently, a problem has been found in the handling of htaccess files, allowing arbitrary code execution as the web server user (regardless of ExecCGI / suexec settings), DoS attacks (killing off apache children), and allowing someone to take control of apache child proc ...

Exploits

source: wwwsecurityfocuscom/bid/5084/info An off-by-one issue exists in mod_ssl that affects Apache when handling certain types of long entries in an htaccess file Though this capability within the web server is not enabled by default, it is popular as it allows non-privileged users to create web access control schemes for hosted sites, ...