Описание
Stack-based buffer overflow in mod_gzip_printf for mod_gzip 1.3.26.1a and earlier, and possibly later official versions, when running in debug mode, allows remote attackers to execute arbitrary code via a long filename in a GET request with an "Accept-Encoding: gzip" header.
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:dag_apt_repository:mod_gzip:1.3.26.1a:*:*:*:*:*:*:*
EPSS
Процентиль: 89%
0.04778
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
debian
почти 22 года назад
Stack-based buffer overflow in mod_gzip_printf for mod_gzip 1.3.26.1a ...
github
больше 3 лет назад
Stack-based buffer overflow in mod_gzip_printf for mod_gzip 1.3.26.1a and earlier, and possibly later official versions, when running in debug mode, allows remote attackers to execute arbitrary code via a long filename in a GET request with an "Accept-Encoding: gzip" header.
EPSS
Процентиль: 89%
0.04778
Низкий
7.5 High
CVSS2
Дефекты
NVD-CWE-Other