7.5
CVSSv2

CVE-2003-0842

Published: 17/11/2003 Updated: 18/10/2016
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Stack-based buffer overflow in mod_gzip_printf for mod_gzip 1.3.26.1a and previous versions, and possibly later official versions, when running in debug mode, allows remote malicious users to execute arbitrary code via a long filename in a GET request with an "Accept-Encoding: gzip" header.

Vulnerable Product Search on Vulmon Subscribe to Product

dag apt repository mod gzip 1.3.26.1a

Exploits

/* \ [exploit code] for mod_gzip (with debug_mode) <= 12261a / \ Created by xCrZx crazy_einstein yahoo com /050603/ / \ Tested on RedHat 80 (Psyche) (here is target for it), / also tested on FreeBSD 47 (13192a) (here is no target for it :) / \ */ /* \ / Single mode: \ / [crz@blacksand crz]$ /85mod_gzip -t 0 -h ...