Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.

Project Subscriptions

Vendors Products
Http Server Subscribe
Openpkg Subscribe
Openpkg Subscribe
Enterprise Linux Subscribe
Rhel Stronghold Subscribe
Stronghold Subscribe
Slackware Subscribe
Slackware Linux Subscribe
Suse Linux Subscribe
Trustix Subscribe
Secure Linux Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://marc.info/?l=bugtraq&m=109906660225051&w=2 cve-icon cve-icon
http://secunia.com/advisories/12898/ cve-icon cve-icon
http://secunia.com/advisories/19073 cve-icon cve-icon
http://securitytracker.com/id?1011783 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm cve-icon cve-icon
http://www.apacheweek.com/features/security-13 cve-icon cve-icon
http://www.debian.org/security/2004/dsa-594 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2004:134 cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2004-600.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2005-816.html cve-icon cve-icon
http://www.securityfocus.com/bid/11471 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/0789 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/17785 cve-icon cve-icon
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2004-0940 cve-icon
https://www.cve.org/CVERecord?id=CVE-2004-0940 cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-08T00:31:48.244Z

Reserved: 2004-10-12T00:00:00

Link: CVE-2004-0940

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2005-02-09T05:00:00.000

Modified: 2025-04-03T01:03:51.193

Link: CVE-2004-0940

cve-icon Redhat

Severity : Moderate

Publid Date: 2004-10-21T00:00:00Z

Links: CVE-2004-0940 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses