Vulnerability Note VU#481998

Apache vulnerable to buffer overflow when expanding environment variables

Original Release date: 17 Sep 2004 | Last revised: 17 Sep 2004

Overview

There is a buffer overflow vulnerability in ap_resolve_env() function of Apache that could allow a local user to gain elevated privileges.

Description

The Apache HTTP Server is a freely available web server that runs on a variety of operating systems including Unix, Linux, and Microsoft Windows. The ap_resolve_env() function is responsible for expanding environment variables when parsing configurations files such as .htaccess or httpd.conf. There is a vulnerability in this function that could allow a local user to trigger a buffer overflow.

The Apache Software Foundation notes that in order to exploit this vulnerability, a local user would need to install the malicious configuration file on the server and force the server to parse this file.

Impact

A local user with the ability to force a vulnerable to server to parse a malicious configuration file could gain elevated privileges.

Solution

Upgrade or Apply Patch
Upgrade or apply patch as specified by your vendor. This issue is resolved in Apache version 2.0.51.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
ApacheAffected-17 Sep 2004
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was reported by the Swedish IT Incident Centre within the National Post and Telecom Agency (SITIC).

This document was written by Damon Morda.

Other Information

  • CVE IDs: CAN-2004-0747
  • Date Public: 15 Sep 2004
  • Date First Published: 17 Sep 2004
  • Date Last Updated: 17 Sep 2004
  • Severity Metric: 3.37
  • Document Revision: 9

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.