7.2
CVSSv2

CVE-2003-0542

CVSSv4: NA | CVSSv3: NA | CVSSv2: 7.2 | VMScore: 820 | EPSS: 0.0008 | KEV: Not Included
Published: 03/11/2003 Updated: 20/11/2024

Vulnerability Summary

Multiple stack-based buffer overflows in (1) mod_alias and (2) mod_rewrite for Apache prior to 1.3.29 allow malicious users to create configuration files to cause a denial of service (crash) or execute arbitrary code via a regular expression with more than 9 captures.

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server 1.3

apache http server 1.3.1

apache http server 1.3.3

apache http server 1.3.4

apache http server 1.3.6

apache http server 1.3.9

apache http server 1.3.11

apache http server 1.3.12

apache http server 1.3.14

apache http server 1.3.17

apache http server 1.3.18

apache http server 1.3.19

apache http server 1.3.20

apache http server 1.3.22

apache http server 1.3.23

apache http server 1.3.24

apache http server 1.3.25

apache http server 1.3.26

apache http server 1.3.27

apache http server 1.3.28

apache http server 2.0

apache http server 2.0.28

apache http server 2.0.32

apache http server 2.0.35

apache http server 2.0.36

apache http server 2.0.37

apache http server 2.0.38

apache http server 2.0.39

apache http server 2.0.40

apache http server 2.0.41

apache http server 2.0.42

apache http server 2.0.43

apache http server 2.0.44

apache http server 2.0.45

apache http server 2.0.46

apache http server 2.0.47

References

CWE-119https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/434566https://www.first.org/epssftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.6/SCOSA-2004.6.txtftp://patches.sgi.com/support/free/security/advisories/20031203-01-U.ascftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.aschttp://docs.info.apple.com/article.html?artnum=61798http://httpd.apache.org/dist/httpd/Announcement2.htmlhttp://lists.apple.com/archives/security-announce/2004/Jan/msg00000.htmlhttp://lists.apple.com/mhonarc/security-announce/msg00045.htmlhttp://marc.info/?l=bugtraq&m=106761802305141&w=2http://marc.info/?l=bugtraq&m=130497311408250&w=2http://marc.info/?l=bugtraq&m=130497311408250&w=2http://secunia.com/advisories/10096http://secunia.com/advisories/10098http://secunia.com/advisories/10102http://secunia.com/advisories/10112http://secunia.com/advisories/10114http://secunia.com/advisories/10153http://secunia.com/advisories/10260http://secunia.com/advisories/10264http://secunia.com/advisories/10463http://secunia.com/advisories/10580http://secunia.com/advisories/10593http://sunsolve.sun.com/search/document.do?assetkey=1-26-101444-1http://sunsolve.sun.com/search/document.do?assetkey=1-26-101841-1http://www.kb.cert.org/vuls/id/434566http://www.kb.cert.org/vuls/id/549142http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:103http://www.redhat.com/support/errata/RHSA-2003-320.htmlhttp://www.redhat.com/support/errata/RHSA-2003-360.htmlhttp://www.redhat.com/support/errata/RHSA-2003-405.htmlhttp://www.redhat.com/support/errata/RHSA-2004-015.htmlhttp://www.redhat.com/support/errata/RHSA-2005-816.htmlhttp://www.securityfocus.com/advisories/6079http://www.securityfocus.com/archive/1/342674http://www.securityfocus.com/bid/8911http://www.securityfocus.com/bid/9504https://exchange.xforce.ibmcloud.com/vulnerabilities/13400https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Ehttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3799https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A863https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A864https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9458ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.6/SCOSA-2004.6.txtftp://patches.sgi.com/support/free/security/advisories/20031203-01-U.ascftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.aschttp://docs.info.apple.com/article.html?artnum=61798http://httpd.apache.org/dist/httpd/Announcement2.htmlhttp://lists.apple.com/archives/security-announce/2004/Jan/msg00000.htmlhttp://lists.apple.com/mhonarc/security-announce/msg00045.htmlhttp://marc.info/?l=bugtraq&m=106761802305141&w=2http://marc.info/?l=bugtraq&m=130497311408250&w=2http://marc.info/?l=bugtraq&m=130497311408250&w=2http://secunia.com/advisories/10096http://secunia.com/advisories/10098http://secunia.com/advisories/10102http://secunia.com/advisories/10112http://secunia.com/advisories/10114http://secunia.com/advisories/10153http://secunia.com/advisories/10260http://secunia.com/advisories/10264http://secunia.com/advisories/10463http://secunia.com/advisories/10580http://secunia.com/advisories/10593http://sunsolve.sun.com/search/document.do?assetkey=1-26-101444-1http://sunsolve.sun.com/search/document.do?assetkey=1-26-101841-1http://www.kb.cert.org/vuls/id/434566http://www.kb.cert.org/vuls/id/549142http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:103http://www.redhat.com/support/errata/RHSA-2003-320.htmlhttp://www.redhat.com/support/errata/RHSA-2003-360.htmlhttp://www.redhat.com/support/errata/RHSA-2003-405.htmlhttp://www.redhat.com/support/errata/RHSA-2004-015.htmlhttp://www.redhat.com/support/errata/RHSA-2005-816.htmlhttp://www.securityfocus.com/advisories/6079http://www.securityfocus.com/archive/1/342674http://www.securityfocus.com/bid/8911http://www.securityfocus.com/bid/9504https://exchange.xforce.ibmcloud.com/vulnerabilities/13400https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Ehttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3799https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A863https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A864https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9458