Vulnerability Note VU#366020
Apache mod_tcl module contains a format string error
A format string vulnerability exists in the mod_tcl Apache module. This vulnerability may allow a remote attacker to execute arbitrary code.
The Apache HTTP Server, also known as httpd, is an open-source HTTP server that runs on Microsoft Windows, Linux, Unix, and Apple OS X Operating Systems. Apache modules can be used to extend the functionality of the Apache web server. The mod_tcl module is a scripting module that allows Apache to run TCL scripts natively.
There is a format string vulnerability in the mod_tcl module that may allow an attacker to execute arbitrary code.
A remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the httpd process.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Apache HTTP Server Project||Affected||-||07 Nov 2006|
CVSS Metrics (Learn More)
Thanks to the mod_tcl and Gentoo teams for providing information about this vulnerability.
This document was written by Ryan Giobbi.
- CVE IDs: CVE-2006-4154
- Date Public: 14 Oct 2006
- Date First Published: 07 Nov 2006
- Date Last Updated: 07 Nov 2006
- Severity Metric: 3.99
- Document Revision: 27
If you have feedback, comments, or additional information about this vulnerability, please send us email.