Upstream information
Description
Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
National Vulnerability Database | |
---|---|
Base Score | 6.9 |
Vector | AV:L/AC:M/Au:N/C:C/I:C/A:C |
Access Vector | Local |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Complete |
Integrity Impact | Complete |
Availability Impact | Complete |
National Vulnerability Database | |
---|---|
Base Score | 7.8 |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Attack Vector | Local |
Attack Complexity | Low |
Privileges Required | Low |
User Interaction | None |
Scope | Unchanged |
Confidentiality Impact | High |
Integrity Impact | High |
Availability Impact | High |
CVSSv3 Version | 3.1 |
SUSE Security Advisories:
- SUSE-SA:2004:040, published Monday, Nov 15th 2004 18:00 MEST
- SUSE-SA:2004:041, published Wednesday, Nov 17th 2004 15:00 MET
- SUSE-SR:2004:001, published Wednesday, Nov 24th 2004 12:00 MEST
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 01:00:39 2013CVE page last modified: Mon Sep 9 20:55:36 2024