Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2003-1418

Опубликовано: 25 фев. 2003
Источник: redhat
CVSS2: 2.6

Описание

Apache HTTP Server 1.3.22 through 1.3.27 on OpenBSD allows remote attackers to obtain sensitive information via (1) the ETag header, which reveals the inode number, or (2) multipart MIME boundary, which reveals child process IDs (PID).

Отчет

Red Hat does not consider this to be a security issue. The information returned poses no threat to the target machine running httpd.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4httpdWill not fix
Red Hat Enterprise Linux 5httpdWill not fix
Red Hat Enterprise Linux 6httpdWill not fix

Показывать по

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=733043httpd information disclosure in FileEtag

2.6 Low

CVSS2

Связанные уязвимости

nvd
больше 21 года назад

Apache HTTP Server 1.3.22 through 1.3.27 on OpenBSD allows remote attackers to obtain sensitive information via (1) the ETag header, which reveals the inode number, or (2) multipart MIME boundary, which reveals child process IDs (PID).

github
больше 3 лет назад

Apache HTTP Server 1.3.22 through 1.3.27 on OpenBSD allows remote attackers to obtain sensitive information via (1) the ETag header, which reveals the inode number, or (2) multipart MIME boundary, which reveals child process IDs (PID).

suse-cvrf
почти 11 лет назад

Recommended update for apache2

2.6 Low

CVSS2