Buffer overflow in htdigest in Apache 1.3.26 and 1.3.27 may allow malicious users to execute arbitrary code via a long user argument. NOTE: since htdigest is normally only locally accessible and not setuid or setgid, there are few attack vectors which would lead to an escalation of privileges, unless htdigest is executed from a CGI program. Therefore this may not be a vulnerability.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache http server 1.3.1 |
||
apache http server 1.3.3 |
||
apache http server 1.3.4 |
||
apache http server 1.3.6 |
||
apache http server 1.3.9 |
||
apache http server 1.3.11 |
||
apache http server 1.3.12 |
||
apache http server 1.3.14 |
||
apache http server 1.3.17 |
||
apache http server 1.3.18 |
||
apache http server 1.3.19 |
||
apache http server 1.3.20 |
||
apache http server 1.3.22 |
||
apache http server 1.3.23 |
||
apache http server 1.3.24 |
||
apache http server 1.3.25 |
||
apache http server 1.3.26 |
||
apache http server 1.3.27 |