Описание
Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
Ссылки
- Mailing ListThird Party Advisory
- Broken Link
- Broken Link
- Broken LinkThird Party AdvisoryVDB Entry
- Broken Link
- Third Party Advisory
- Product
- Mailing ListThird Party Advisory
- Third Party Advisory
- Broken Link
- Broken Link
- Broken LinkExploitPatchThird Party AdvisoryVDB EntryVendor Advisory
- Broken Link
- Third Party AdvisoryVDB Entry
- Mailing ListPatch
- Mailing ListPatch
- Mailing ListPatch
- Mailing ListPatch
- Mailing ListPatch
- Mailing ListPatch
Уязвимые конфигурации
Одно из
Одно из
EPSS
7.8 High
CVSS3
6.9 Medium
CVSS2
Дефекты
Связанные уязвимости
Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
Buffer overflow in the get_tag function in mod_include for Apache 1.3. ...
Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
EPSS
7.8 High
CVSS3
6.9 Medium
CVSS2