Apache 1.3.x < 1.3.42 mod_proxy Integer Overflow

critical Nessus Plugin ID 44589

Synopsis

The remote web server may be affected by an integer overflow vulnerability.

Description

According to its banner, the version of Apache 1.3.x running on the remote host is prior 1.3.42. It is, therefore, potentially affected by an integer overflow vulnerability in the mod_proxy Apache module.
A remote attacker can exploit this to cause a denial of service condition or to execute arbitrary code.

Note that successful exploitation is possible only on platforms where sizeof(int) < sizeof(long), such as 64-bit architectures.

Also note that version 1.3.42 is the final release of Apache 1.3.

Solution

Upgrade to Apache version 1.3.42 or later. Alternatively, disable mod_proxy.

See Also

http://site.pi3.com.pl/adv/mod_proxy.txt

https://seclists.org/fulldisclosure/2010/Jan/584

http://www.nessus.org/u?2b8a4a59

Plugin Details

Severity: Critical

ID: 44589

File Name: apache_1_3_42.nasl

Version: 1.17

Type: remote

Family: Web Servers

Published: 2/11/2010

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:http_server

Required KB Items: installed_sw/Apache

Exploit Ease: No known exploits are available

Patch Publication Date: 1/27/2010

Vulnerability Publication Date: 1/27/2010

Reference Information

CVE: CVE-2010-0010

BID: 37966

CWE: 189

Secunia: 38319