10
CVSSv2

CVE-2004-0492

CVSSv4: NA | CVSSv3: NA | CVSSv2: 10 | VMScore: 1000 | EPSS: 0.04049 | KEV: Not Included
Published: 06/08/2004 Updated: 20/11/2024

Vulnerability Summary

Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote malicious users to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server 1.3.26

apache http server 1.3.27

apache http server 1.3.28

apache http server 1.3.29

apache http server 1.3.31

hp virtualvault 11.0.4

hp webproxy 2.0

hp webproxy 2.1

ibm http server 1.3.26

ibm http server 1.3.26.1

ibm http server 1.3.26.2

ibm http server 1.3.28

sgi propack 2.4

hp vvos 11.04

openbsd openbsd

openbsd openbsd 3.4

openbsd openbsd 3.5

Vendor Advisories

Synopsis apache, mod_ssl security update Type/Severity Security Advisory: Moderate Topic Updated httpd and mod_ssl packages that fix minor security issues inthe Apache Web server are now available for Red Hat Enterprise Linux 21 Description The Apache HTTP Server is a powerful, full-featu ...

References

NVD-CWE-Otherhttps://access.redhat.com/errata/RHSA-2004:245https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/541310https://www.first.org/epssftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.aschttp://marc.info/?l=bugtraq&m=108711172710140&w=2http://marc.info/?l=bugtraq&m=130497311408250&w=2http://marc.info/?l=bugtraq&m=130497311408250&w=2http://rhn.redhat.com/errata/RHSA-2004-245.htmlhttp://seclists.org/lists/fulldisclosure/2004/Jun/0296.htmlhttp://secunia.com/advisories/11841http://sunsolve.sun.com/search/document.do?assetkey=1-26-101555-1http://sunsolve.sun.com/search/document.do?assetkey=1-26-101841-1http://sunsolve.sun.com/search/document.do?assetkey=1-26-57628-1http://www.debian.org/security/2004/dsa-525http://www.guninski.com/modproxy1.htmlhttp://www.kb.cert.org/vuls/id/541310http://www.mandriva.com/security/advisories?name=MDKSA-2004:065https://bugzilla.fedora.us/show_bug.cgi?id=1737https://exchange.xforce.ibmcloud.com/vulnerabilities/16387https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Ehttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100112https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4863ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.aschttp://marc.info/?l=bugtraq&m=108711172710140&w=2http://marc.info/?l=bugtraq&m=130497311408250&w=2http://marc.info/?l=bugtraq&m=130497311408250&w=2http://rhn.redhat.com/errata/RHSA-2004-245.htmlhttp://seclists.org/lists/fulldisclosure/2004/Jun/0296.htmlhttp://secunia.com/advisories/11841http://sunsolve.sun.com/search/document.do?assetkey=1-26-101555-1http://sunsolve.sun.com/search/document.do?assetkey=1-26-101841-1http://sunsolve.sun.com/search/document.do?assetkey=1-26-57628-1http://www.debian.org/security/2004/dsa-525http://www.guninski.com/modproxy1.htmlhttp://www.kb.cert.org/vuls/id/541310http://www.mandriva.com/security/advisories?name=MDKSA-2004:065https://bugzilla.fedora.us/show_bug.cgi?id=1737https://exchange.xforce.ibmcloud.com/vulnerabilities/16387https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Ehttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100112https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4863