Description
Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.
Product(s):
- Apache Software Foundation Apache HTTP Server 1.3.26
- Apache Software Foundation Apache HTTP Server 1.3.27
- Apache Software Foundation Apache HTTP Server 1.3.28
- Apache Software Foundation Apache HTTP Server 1.3.29
- Apache Software Foundation Apache HTTP Server 1.3.31
- HP VirtualVault 11.0.4
- HP Webproxy 2.0
- HP Webproxy 2.1
- IBM IBM HTTP Server 1.3.26.1
- IBM IBM HTTP Server 1.3.26.2
- IBM IBM HTTP Server 1.3.26
- IBM IBM HTTP Server 1.3.28
- SGI ProPack 2.4
- HP VVOS 11.04
- OpenBSD OpenBSD
- OpenBSD
- OpenBSD 2.0
- OpenBSD 2.1
- OpenBSD 2.2
- OpenBSD 2.3
- OpenBSD 2.4
- OpenBSD 2.5
- OpenBSD 2.6
- OpenBSD 2.7
- OpenBSD 2.8
- OpenBSD 2.9
- OpenBSD 3.0
- OpenBSD 3.1
- OpenBSD 3.2
- OpenBSD 3.3
- OpenBSD 3.4
- OpenBSD 3.5
- OpenBSD 3.6
- OpenBSD 3.7
- OpenBSD 3.8
- OpenBSD 3.9
- OpenBSD 4.0
- OpenBSD 4.1
- OpenBSD 4.2
- OpenBSD 4.3
- OpenBSD 4.4
- OpenBSD 4.5
- OpenBSD 4.6
- OpenBSD 4.7
- OpenBSD 4.8
- OpenBSD 4.9
- OpenBSD 5.0
- OpenBSD 5.1
- OpenBSD 5.2
- OpenBSD 5.3
- OpenBSD 5.4
- OpenBSD 5.5
- Openbsd Openbsd 5.6
- OpenBSD 5.7
- OpenBSD 5.8
- OpenBSD 5.9
- OpenBSD 6.0
- OpenBSD 6.1
- OpenBSD 6.2
- OpenBSD 6.3
- OpenBSD 6.4
- OpenBSD 6.5
- OpenBSD 6.6
- OpenBSD 6.7
- OpenBSD OpenBSD 6.9
- OpenBSD OpenBSD 7.0
- OpenBSD 7.1
- OpenBSD 7.2
- OpenBSD 7.3
- OpenBSD 7.3
- OpenBSD 7.3 Errata 001
- OpenBSD 7.3 Errata 002
- OpenBSD 7.3 Errata 003
- OpenBSD 7.3 Errata 004
- OpenBSD 7.3 Errata 005
- OpenBSD 7.3 Errata 006
- OpenBSD 7.3 Errata 007
- OpenBSD 7.3 Errata 008
- OpenBSD 7.3 Errata 009
- OpenBSD 7.3 Errata 010
- OpenBSD 7.3 Errata 011
- OpenBSD 7.3 Errata 012
- OpenBSD 7.3 Errata 013
- OpenBSD 7.3 Errata 014
- OpenBSD 7.3 Errata 015
- OpenBSD 7.3 Errata 016
- OpenBSD 7.3 Errata 017
- OpenBSD 8.0
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-0492, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-0492 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.