7.5
CVSSv2

CVE-2004-0700

Published: 27/07/2004 Updated: 11/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Format string vulnerability in the mod_proxy hook functions function in ssl_engine_log.c in mod_ssl prior to 2.8.19 for Apache prior to 1.3.31 may allow remote malicious users to execute arbitrary messages via format string specifiers in certain log messages for HTTPS that are handled by the ssl_log function.

Vulnerable Product Search on Vulmon Subscribe to Product

mod ssl mod ssl 2.4.10

mod ssl mod ssl 2.4.2

mod ssl mod ssl 2.4.9

mod ssl mod ssl 2.5.0

mod ssl mod ssl 2.6.6

mod ssl mod ssl 2.7.0

mod ssl mod ssl 2.8.14

mod ssl mod ssl 2.8.15

mod ssl mod ssl 2.8.5

mod ssl mod ssl 2.8.5.1

mod ssl mod ssl 2.4.0

mod ssl mod ssl 2.4.1

mod ssl mod ssl 2.4.7

mod ssl mod ssl 2.4.8

mod ssl mod ssl 2.6.4

mod ssl mod ssl 2.6.5

mod ssl mod ssl 2.8.10

mod ssl mod ssl 2.8.12

mod ssl mod ssl 2.8.3

mod ssl mod ssl 2.8.4

mod ssl mod ssl 2.4.3

mod ssl mod ssl 2.4.4

mod ssl mod ssl 2.5.1

mod ssl mod ssl 2.6.0

mod ssl mod ssl 2.7.1

mod ssl mod ssl 2.8.0

mod ssl mod ssl 2.8.16

mod ssl mod ssl 2.8.17

mod ssl mod ssl 2.8.5.2

mod ssl mod ssl 2.8.6

mod ssl mod ssl 2.8.7

mod ssl mod ssl 2.3.11

mod ssl mod ssl 2.4.5

mod ssl mod ssl 2.4.6

mod ssl mod ssl 2.6.1

mod ssl mod ssl 2.6.2

mod ssl mod ssl 2.6.3

mod ssl mod ssl 2.8.1

mod ssl mod ssl 2.8.1.2

mod ssl mod ssl 2.8.18

mod ssl mod ssl 2.8.2

mod ssl mod ssl 2.8.8

mod ssl mod ssl 2.8.9

gentoo linux 1.4

Vendor Advisories

Synopsis mod_ssl security update Type/Severity Security Advisory: Important Topic An updated mod_ssl package for Apache that fixes a format stringvulnerability is now available Description The mod_ssl module provides strong cryptography for the Apache Webserver via the Secure Sockets Layer ...
Two vulnerabilities were discovered in libapache-mod-ssl: CAN-2004-0488 Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_utilc for Apache mod_ssl, when mod_ssl is configured to trust the issuing CA, may allow remote attackers to execute arbitrary code via a client certificate with a long subject DN CAN-2004-0 ...