http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.
References
Link Providers
ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P cve-icon cve-icon
http://archives.neohapsis.com/archives/bugtraq/2006-05/0151.html cve-icon cve-icon
http://archives.neohapsis.com/archives/bugtraq/2006-07/0425.html cve-icon cve-icon
http://kb.vmware.com/KanisaPlatform/Publishing/466/5915871_f.SAL_Public.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=125631037611762&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=129190899612998&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=130497311408250&w=2 cve-icon cve-icon
http://openbsd.org/errata.html#httpd2 cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2006-0618.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2006-0692.html cve-icon cve-icon
http://secunia.com/advisories/21172 cve-icon cve-icon
http://secunia.com/advisories/21174 cve-icon cve-icon
http://secunia.com/advisories/21399 cve-icon cve-icon
http://secunia.com/advisories/21478 cve-icon cve-icon
http://secunia.com/advisories/21598 cve-icon cve-icon
http://secunia.com/advisories/21744 cve-icon cve-icon
http://secunia.com/advisories/21848 cve-icon cve-icon
http://secunia.com/advisories/21986 cve-icon cve-icon
http://secunia.com/advisories/22140 cve-icon cve-icon
http://secunia.com/advisories/22317 cve-icon cve-icon
http://secunia.com/advisories/22523 cve-icon cve-icon
http://secunia.com/advisories/28749 cve-icon cve-icon
http://secunia.com/advisories/29640 cve-icon cve-icon
http://secunia.com/advisories/40256 cve-icon cve-icon
http://securityreason.com/securityalert/1294 cve-icon cve-icon
http://securitytracker.com/id?1016569 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2006-194.htm cve-icon cve-icon
http://svn.apache.org/viewvc?view=rev&revision=394965 cve-icon cve-icon
http://www-1.ibm.com/support/docview.wss?uid=swg1PK24631 cve-icon cve-icon
http://www-1.ibm.com/support/docview.wss?uid=swg24013080 cve-icon cve-icon
http://www.debian.org/security/2006/dsa-1167 cve-icon cve-icon
http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-2.html cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2006_51_apache.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2006-0619.html cve-icon cve-icon
http://www.securityfocus.com/bid/19661 cve-icon cve-icon
http://www.securitytracker.com/id?1024144 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-575-1 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/2963 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/2964 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/3264 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/4207 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/5089 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/1572 cve-icon cve-icon
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117 cve-icon cve-icon
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2006-3918 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10352 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12238 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2006-3918 cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2006-07-28T00:00:00

Updated: 2024-08-07T18:48:39.410Z

Reserved: 2006-07-27T00:00:00

Link: CVE-2006-3918

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2006-07-28T00:04:00.000

Modified: 2024-11-21T00:14:42.577

Link: CVE-2006-3918

cve-icon Redhat

Severity : Moderate

Publid Date: 2006-05-08T00:00:00Z

Links: CVE-2006-3918 - Bugzilla