Vulnerability Note VU#481998
Apache vulnerable to buffer overflow when expanding environment variables
There is a buffer overflow vulnerability in ap_resolve_env() function of Apache that could allow a local user to gain elevated privileges.
The Apache HTTP Server is a freely available web server that runs on a variety of operating systems including Unix, Linux, and Microsoft Windows. The ap_resolve_env() function is responsible for expanding environment variables when parsing configurations files such as .htaccess or httpd.conf. There is a vulnerability in this function that could allow a local user to trigger a buffer overflow.
The Apache Software Foundation notes that in order to exploit this vulnerability, a local user would need to install the malicious configuration file on the server and force the server to parse this file.
A local user with the ability to force a vulnerable to server to parse a malicious configuration file could gain elevated privileges.
Upgrade or Apply Patch
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Apache||Affected||-||17 Sep 2004|
CVSS Metrics (Learn More)
This vulnerability was reported by the Swedish IT Incident Centre within the National Post and Telecom Agency (SITIC).
This document was written by Damon Morda.
- CVE IDs: CAN-2004-0747
- Date Public: 15 Sep 2004
- Date First Published: 17 Sep 2004
- Date Last Updated: 17 Sep 2004
- Severity Metric: 3.37
- Document Revision: 9
If you have feedback, comments, or additional information about this vulnerability, please send us email.