7.5
CVSSv2

CVE-2003-0993

Published: 29/03/2004 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

mod_access in Apache 1.3 prior to 1.3.30, when running big-endian 64-bit platforms, does not properly parse Allow/Deny rules using IP addresses without a netmask, which could allow remote malicious users to bypass intended access restrictions.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server 1.3.23

apache http server 1.3.27

apache http server 1.3.1

apache http server 1.3.25

apache http server 1.3.28

apache http server 1.3.19

apache http server 1.3.24

apache http server 1.3.20

apache http server 1.3.7

apache http server 1.3.6

apache http server 1.3.4

apache http server 1.3.18

apache http server 1.3

apache http server 1.3.12

apache http server 1.3.3

apache http server 1.3.17

apache http server 1.3.26

apache http server 1.3.9

apache http server 1.3.14

apache http server 1.3.29

apache http server 1.3.22

apache http server 1.3.11

References

NVD-CWE-Otherhttp://www.apacheweek.com/features/security-13http://www.securityfocus.com/bid/9829http://issues.apache.org/bugzilla/show_bug.cgi?id=23850http://security.gentoo.org/glsa/glsa-200405-22.xmlhttp://frontal2.mandriva.com/security/advisories?name=MDKSA-2004:046http://www.slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.529643http://sunsolve.sun.com/search/document.do?assetkey=1-26-57628-1http://sunsolve.sun.com/search/document.do?assetkey=1-26-101555-1http://sunsolve.sun.com/search/document.do?assetkey=1-26-101841-1http://www.trustix.org/errata/2004/0027http://marc.info/?l=apache-cvs&m=107869603013722http://marc.info/?l=bugtraq&m=108437852004207&w=2https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4670https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100111https://exchange.xforce.ibmcloud.com/vulnerabilities/15422https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3Ehttps://nvd.nist.gov