mod_access in Apache 1.3 prior to 1.3.30, when running big-endian 64-bit platforms, does not properly parse Allow/Deny rules using IP addresses without a netmask, which could allow remote malicious users to bypass intended access restrictions.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache http server 1.3 |
||
apache http server 1.3.1 |
||
apache http server 1.3.3 |
||
apache http server 1.3.4 |
||
apache http server 1.3.6 |
||
apache http server 1.3.7 |
||
apache http server 1.3.9 |
||
apache http server 1.3.11 |
||
apache http server 1.3.12 |
||
apache http server 1.3.14 |
||
apache http server 1.3.17 |
||
apache http server 1.3.18 |
||
apache http server 1.3.19 |
||
apache http server 1.3.20 |
||
apache http server 1.3.22 |
||
apache http server 1.3.23 |
||
apache http server 1.3.24 |
||
apache http server 1.3.25 |
||
apache http server 1.3.26 |
||
apache http server 1.3.27 |
||
apache http server 1.3.28 |
||
apache http server 1.3.29 |