7.5
CVSSv2

CVE-2003-0993

Published: 29/03/2004 Updated: 06/06/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

mod_access in Apache 1.3 prior to 1.3.30, when running big-endian 64-bit platforms, does not properly parse Allow/Deny rules using IP addresses without a netmask, which could allow remote malicious users to bypass intended access restrictions.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server 1.3

apache http server 1.3.1

apache http server 1.3.22

apache http server 1.3.23

apache http server 1.3.3

apache http server 1.3.4

apache http server 1.3.18

apache http server 1.3.19

apache http server 1.3.20

apache http server 1.3.11

apache http server 1.3.12

apache http server 1.3.24

apache http server 1.3.27

apache http server 1.3.25

apache http server 1.3.28

apache http server 1.3.7

apache http server 1.3.6

apache http server 1.3.17

apache http server 1.3.26

apache http server 1.3.9

apache http server 1.3.14

apache http server 1.3.29

References

NVD-CWE-Otherhttp://www.apacheweek.com/features/security-13http://www.securityfocus.com/bid/9829http://issues.apache.org/bugzilla/show_bug.cgi?id=23850http://security.gentoo.org/glsa/glsa-200405-22.xmlhttp://frontal2.mandriva.com/security/advisories?name=MDKSA-2004:046http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.529643http://sunsolve.sun.com/search/document.do?assetkey=1-26-57628-1http://sunsolve.sun.com/search/document.do?assetkey=1-26-101555-1http://sunsolve.sun.com/search/document.do?assetkey=1-26-101841-1http://www.trustix.org/errata/2004/0027http://marc.info/?l=apache-cvs&m=107869603013722http://marc.info/?l=bugtraq&m=108437852004207&w=2https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4670https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100111https://exchange.xforce.ibmcloud.com/vulnerabilities/15422https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e@%3Ccvs.httpd.apache.org%3Ehttp://tools.cisco.com/security/center/viewAlert.x?alertId=7360https://nvd.nist.gov