Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2004-0492

Опубликовано: 10 июн. 2004
Источник: redhat
EPSS Средний

Описание

Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.

Дополнительная информация

Статус:

Low

EPSS

Процентиль: 95%
0.21037
Средний

Связанные уязвимости

ubuntu
почти 21 год назад

Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.

nvd
почти 21 год назад

Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.

debian
почти 21 год назад

Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3 ...

github
около 3 лет назад

Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.

EPSS

Процентиль: 95%
0.21037
Средний