GLSA-200411-03 : Apache 1.3: Buffer overflow vulnerability in mod_include

medium Nessus Plugin ID 15606

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200411-03 (Apache 1.3: Buffer overflow vulnerability in mod_include)

A possible buffer overflow exists in the get_tag() function of mod_include.c.
Impact :

If Server Side Includes (SSI) are enabled, a local attacker may be able to run arbitrary code with the rights of an httpd child process by making use of a specially crafted document with malformed SSI.
Workaround :

There is no known workaround at this time.

Solution

All Apache users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=www-servers/apache-1.3.32-r1'

See Also

http://www.apacheweek.com/features/security-13

https://security.gentoo.org/glsa/200411-03

Plugin Details

Severity: Medium

ID: 15606

File Name: gentoo_GLSA-200411-03.nasl

Version: 1.18

Type: local

Published: 11/2/2004

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:gentoo:linux, p-cpe:/a:gentoo:linux:apache

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 11/2/2004

Vulnerability Publication Date: 10/21/2004

Reference Information

CVE: CVE-2004-0940

CWE: 119

GLSA: 200411-03