First published: Sat Aug 10 2002(Updated: )
Directory traversal vulnerability in Apache 2.0 through 2.0.39 on Windows, OS2, and Netware allows remote attackers to read arbitrary files and execute commands via .. (dot dot) sequences containing \ (backslash) characters.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP Server | =2.0 | |
Apache HTTP Server | =2.0.28 | |
Apache HTTP Server | =2.0.28-beta | |
Apache HTTP Server | =2.0.28-beta | |
Apache HTTP Server | =2.0.32 | |
Apache HTTP Server | =2.0.32-beta | |
Apache HTTP Server | =2.0.34-beta | |
Apache HTTP Server | =2.0.35 | |
Apache HTTP Server | =2.0.36 | |
Apache HTTP Server | =2.0.37 | |
Apache HTTP Server | =2.0.38 | |
Apache HTTP Server | =2.0.39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0661 is considered a critical security vulnerability due to its potential for unauthorized file access and command execution.
To fix CVE-2002-0661, upgrade to a patched version of Apache HTTP Server that is not vulnerable to this directory traversal issue.
CVE-2002-0661 affects Apache HTTP Server versions 2.0 through 2.0.39 on Windows, OS2, and Netware.
CVE-2002-0661 allows remote attackers to read arbitrary files and execute commands on the server.
Yes, CVE-2002-0661 is specifically noted to affect Apache HTTP Server on Windows, OS2, and Netware.