2.1
CVSSv2

CVE-2004-1834

Published: 20/03/2004 Updated: 07/11/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

mod_disk_cache in Apache 2.0 up to and including 2.0.49 stores client headers, including authentication information, on the hard disk, which could allow local users to gain sensitive information.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server 2.0.42

apache http server 2.0.47

apache http server 2.0.35

apache http server 2.0.37

apache http server 2.0.44

apache http server 2.0.39

apache http server 2.0.28

apache http server 2.0.41

apache http server 2.0.49

apache http server 2.0.9

apache http server 2.0.32

apache http server 2.0.38

apache http server 2.0.48

apache http server 2.0.45

apache http server 2.0.40

apache http server 2.0.36

apache http server 2.0.46

apache http server 2.0.43

apache http server 2.0

Vendor Advisories

Synopsis httpd security update Type/Severity Security Advisory: Important Topic Updated httpd packages that include fixes for two security issues, as well asother bugs, are now available Description The Apache HTTP server is a powerful, full-featured, efficient, andfreely-available Web ser ...

References

NVD-CWE-Otherhttp://www.securityfocus.com/bid/9933http://www.osvdb.org/4446http://securitytracker.com/id?1009509http://secunia.com/advisories/11176http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1http://secunia.com/advisories/19072http://www.redhat.com/support/errata/RHSA-2004-562.htmlhttp://support.avaya.com/elmodocs2/security/ASA-2006-081.htmhttp://www.vupen.com/english/advisories/2006/0789http://marc.info/?l=bugtraq&m=107981737322495&w=2https://exchange.xforce.ibmcloud.com/vulnerabilities/15547https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11133https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3Ehttps://access.redhat.com/errata/RHSA-2004:562https://nvd.nist.gov