Description
Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
Product(s):
- Apache HTTP Server
- Apache Software Foundation Apache HTTP Server 1.3.0
- Apache Software Foundation Apache HTTP Server 1.3.1.1
- Apache Software Foundation Apache 1.3.10
- Apache Software Foundation Apache HTTP Server 1.3.11
- Apache Software Foundation Apache HTTP Server 1.3.12
- Apache Software Foundation Apache 1.3.13
- Apache Software Foundation Apache HTTP Server 1.3.14
- Apache Software Foundation Apache 1.3.15
- Apache Software Foundation Apache 1.3.16
- Apache Software Foundation Apache HTTP Server 1.3.17
- Apache Software Foundation Apache HTTP Server 1.3.18
- Apache Software Foundation Apache HTTP Server 1.3.19
- Apache Software Foundation Apache HTTP Server 1.3.1
- Apache Software Foundation Apache HTTP Server 1.3.20
- Apache Software Foundation Apache HTTP Server 1.3.22
- Apache Software Foundation Apache HTTP Server 1.3.23
- Apache Software Foundation Apache HTTP Server 1.3.24
- Apache Software Foundation Apache HTTP Server 1.3.25
- Apache Software Foundation Apache HTTP Server 1.3.26
- Apache Software Foundation Apache HTTP Server 1.3.27
- Apache Software Foundation Apache HTTP Server 1.3.28
- Apache Software Foundation Apache HTTP Server 1.3.29
- Apache Software Foundation Apache HTTP Server 1.3.2
- Apache Software Foundation Apache HTTP Server 1.3.30
- Apache Software Foundation Apache HTTP Server 1.3.31
- Apache Software Foundation Apache HTTP Server 1.3.32
- Apache Software Foundation Apache HTTP Server 1.3.3
- Apache Software Foundation Apache HTTP Server 1.3.4
- Apache Software Foundation Apache HTTP Server 1.3.5
- Apache Software Foundation Apache HTTP Server 1.3.6
- Apache Software Foundation Apache HTTP Server 1.3.7
- Apache Software Foundation Apache HTTP Server 1.3.8
- Apache Software Foundation Apache HTTP Server 1.3.9
- Apache Software Foundation Apache HTTP Server 1.3
- OpenPKG 2.0
- OpenPKG 2.1
- OpenPKG 2.2
- HP-UX 11.00
- HP-UX 11.11
- HP-UX 11i v1.5
- HP-UX 11i v1.6
- Slackware Linux 10.0
- Slackware Linux 8.0
- Slackware Linux 8.1
- Slackware Linux 9.0
- Slackware Linux 9.1
- Slackware Linux current
- SuSE SuSE Linux 8.0
- SuSE SuSE Linux 8.0 alpha
- SuSE SuSE Linux 8.1
- SuSE SuSE Linux 8.2
- SuSE SuSE Linux 9.0
- Suse Suse Linux 9.0 Enterprise Server Edition
- SuSE SuSE Linux 9.1
- SuSE SuSE Linux 9.2
- Trustix Secure Linux 1.5
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-0940, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-0940 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.