Описание
Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 1.3.34-2ubuntu0.1 |
devel | DNE | |
edgy | released | 1.3.34-4ubuntu1 |
feisty | released | 1.3.34-4ubuntu1 |
upstream | needs-triage |
Показывать по
Ссылки на источники
EPSS
6.9 Medium
CVSS2
7.8 High
CVSS3
Связанные уязвимости
Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
Buffer overflow in the get_tag function in mod_include for Apache 1.3. ...
Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
EPSS
6.9 Medium
CVSS2
7.8 High
CVSS3