7.2
CVSSv2

CVE-2003-0542

Published: 03/11/2003 Updated: 07/11/2023
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple stack-based buffer overflows in (1) mod_alias and (2) mod_rewrite for Apache prior to 1.3.29 allow malicious users to create configuration files to cause a denial of service (crash) or execute arbitrary code via a regular expression with more than 9 captures.

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server 2.0.42

apache http server 1.3.23

apache http server 2.0.47

apache http server 1.3.27

apache http server 2.0.35

apache http server 2.0.37

apache http server 2.0.44

apache http server 1.3.1

apache http server 1.3.25

apache http server 1.3.28

apache http server 1.3.19

apache http server 2.0.39

apache http server 1.3.24

apache http server 1.3.20

apache http server 1.3.6

apache http server 2.0.41

apache http server 1.3.4

apache http server 1.3.18

apache http server 2.0.32

apache http server 2.0.38

apache http server 1.3

apache http server 1.3.12

apache http server 1.3.3

apache http server 1.3.17

apache http server 2.0.45

apache http server 1.3.26

apache http server 1.3.9

apache http server 2.0.40

apache http server 2.0.36

apache http server 1.3.14

apache http server 2.0.46

apache http server 1.3.22

apache http server 1.3.11

apache http server 2.0.43

apache http server 2.0.28

apache http server 2.0

References

CWE-119http://www.securityfocus.com/bid/8911http://www.redhat.com/support/errata/RHSA-2004-015.htmlhttp://httpd.apache.org/dist/httpd/Announcement2.htmlhttp://www.securityfocus.com/archive/1/342674http://www.securityfocus.com/advisories/6079http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:103http://www.redhat.com/support/errata/RHSA-2003-320.htmlhttp://www.redhat.com/support/errata/RHSA-2003-360.htmlhttp://www.redhat.com/support/errata/RHSA-2003-405.htmlftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.6/SCOSA-2004.6.txtftp://patches.sgi.com/support/free/security/advisories/20031203-01-U.aschttp://lists.apple.com/mhonarc/security-announce/msg00045.htmlhttp://www.kb.cert.org/vuls/id/434566http://www.kb.cert.org/vuls/id/549142http://secunia.com/advisories/10096http://secunia.com/advisories/10098http://secunia.com/advisories/10102http://secunia.com/advisories/10112http://secunia.com/advisories/10114http://secunia.com/advisories/10153http://secunia.com/advisories/10260http://secunia.com/advisories/10264http://secunia.com/advisories/10463http://www.securityfocus.com/bid/9504http://www.redhat.com/support/errata/RHSA-2005-816.htmlhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-101444-1http://sunsolve.sun.com/search/document.do?assetkey=1-26-101841-1http://lists.apple.com/archives/security-announce/2004/Jan/msg00000.htmlftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.aschttp://secunia.com/advisories/10580http://secunia.com/advisories/10593http://marc.info/?l=bugtraq&m=130497311408250&w=2http://docs.info.apple.com/article.html?artnum=61798http://marc.info/?l=bugtraq&m=106761802305141&w=2https://exchange.xforce.ibmcloud.com/vulnerabilities/13400https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9458https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A864https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A863https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3799https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3Ehttps://nvd.nist.govhttps://www.kb.cert.org/vuls/id/434566