Description
http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.
Published: 2006-07-28
Score: 4.3 Medium
EPSS: 91.4% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1167-1 New apache packages fix several vulnerabilities
Ubuntu USN Ubuntu USN USN-575-1 Apache vulnerabilities
References
Link Providers
ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P cve-icon cve-icon
http://archives.neohapsis.com/archives/bugtraq/2006-05/0151.html cve-icon cve-icon
http://archives.neohapsis.com/archives/bugtraq/2006-07/0425.html cve-icon cve-icon
http://kb.vmware.com/KanisaPlatform/Publishing/466/5915871_f.SAL_Public.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=125631037611762&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=129190899612998&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=130497311408250&w=2 cve-icon cve-icon
http://openbsd.org/errata.html#httpd2 cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2006-0618.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2006-0692.html cve-icon cve-icon
http://secunia.com/advisories/21172 cve-icon cve-icon
http://secunia.com/advisories/21174 cve-icon cve-icon
http://secunia.com/advisories/21399 cve-icon cve-icon
http://secunia.com/advisories/21478 cve-icon cve-icon
http://secunia.com/advisories/21598 cve-icon cve-icon
http://secunia.com/advisories/21744 cve-icon cve-icon
http://secunia.com/advisories/21848 cve-icon cve-icon
http://secunia.com/advisories/21986 cve-icon cve-icon
http://secunia.com/advisories/22140 cve-icon cve-icon
http://secunia.com/advisories/22317 cve-icon cve-icon
http://secunia.com/advisories/22523 cve-icon cve-icon
http://secunia.com/advisories/28749 cve-icon cve-icon
http://secunia.com/advisories/29640 cve-icon cve-icon
http://secunia.com/advisories/40256 cve-icon cve-icon
http://securityreason.com/securityalert/1294 cve-icon cve-icon
http://securitytracker.com/id?1016569 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2006-194.htm cve-icon cve-icon
http://svn.apache.org/viewvc?view=rev&revision=394965 cve-icon cve-icon
http://www-1.ibm.com/support/docview.wss?uid=swg1PK24631 cve-icon cve-icon
http://www-1.ibm.com/support/docview.wss?uid=swg24013080 cve-icon cve-icon
http://www.debian.org/security/2006/dsa-1167 cve-icon cve-icon
http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-2.html cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2006_51_apache.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2006-0619.html cve-icon cve-icon
http://www.securityfocus.com/bid/19661 cve-icon cve-icon
http://www.securitytracker.com/id?1024144 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-575-1 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/2963 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/2964 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/3264 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/4207 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/5089 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/1572 cve-icon cve-icon
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117 cve-icon cve-icon
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2006-3918 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10352 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12238 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2006-3918 cve-icon
History

No history.

Subscriptions

Apache Http Server
Canonical Ubuntu Linux
Debian Debian Linux
Redhat Certificate System Enterprise Linux Enterprise Linux Server Enterprise Linux Workstation Network Proxy Rhel Stronghold
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T18:48:39.410Z

Reserved: 2006-07-27T00:00:00.000Z

Link: CVE-2006-3918

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2006-07-28T00:04:00.000

Modified: 2026-04-16T00:27:16.627

Link: CVE-2006-3918

cve-icon Redhat

Severity : Moderate

Publid Date: 2006-05-08T00:00:00Z

Links: CVE-2006-3918 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses