10
CVSSv2

CVE-2004-0492

Published: 06/08/2004 Updated: 07/11/2023
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote malicious users to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.

Vulnerable Product Search on Vulmon Subscribe to Product

hp webproxy 2.0

hp virtualvault 11.0.4

apache http server 1.3.27

ibm http server 1.3.28

apache http server 1.3.28

apache http server 1.3.31

hp webproxy 2.1

ibm http server 1.3.26.1

apache http server 1.3.26

apache http server 1.3.29

sgi propack 2.4

ibm http server 1.3.26

ibm http server 1.3.26.2

hp vvos 11.04

openbsd openbsd 3.5

openbsd openbsd

openbsd openbsd 3.4

Vendor Advisories

Synopsis apache, mod_ssl security update Type/Severity Security Advisory: Moderate Topic Updated httpd and mod_ssl packages that fix minor security issues inthe Apache Web server are now available for Red Hat Enterprise Linux 21 Description The Apache HTTP Server is a powerful, full-featu ...

References

NVD-CWE-Otherhttp://www.debian.org/security/2004/dsa-525http://rhn.redhat.com/errata/RHSA-2004-245.htmlhttp://seclists.org/lists/fulldisclosure/2004/Jun/0296.htmlhttp://www.guninski.com/modproxy1.htmlhttps://bugzilla.fedora.us/show_bug.cgi?id=1737ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.aschttp://www.kb.cert.org/vuls/id/541310http://secunia.com/advisories/11841http://sunsolve.sun.com/search/document.do?assetkey=1-26-57628-1http://sunsolve.sun.com/search/document.do?assetkey=1-26-101555-1http://sunsolve.sun.com/search/document.do?assetkey=1-26-101841-1http://www.mandriva.com/security/advisories?name=MDKSA-2004:065http://marc.info/?l=bugtraq&m=130497311408250&w=2http://marc.info/?l=bugtraq&m=108711172710140&w=2https://exchange.xforce.ibmcloud.com/vulnerabilities/16387https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4863https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100112https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3Ehttps://access.redhat.com/errata/RHSA-2004:245https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/541310