First published: Mon Mar 29 2004(Updated: )
mod_access in Apache 1.3 before 1.3.30, when running big-endian 64-bit platforms, does not properly parse Allow/Deny rules using IP addresses without a netmask, which could allow remote attackers to bypass intended access restrictions.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP server | =1.3.23 | |
Apache HTTP server | =1.3.27 | |
Apache HTTP server | =1.3.1 | |
Apache HTTP server | =1.3.25 | |
Apache HTTP server | =1.3.28 | |
Apache HTTP server | =1.3.19 | |
Apache HTTP server | =1.3.24 | |
Apache HTTP server | =1.3.20 | |
Apache HTTP server | =1.3.7 | |
Apache HTTP server | =1.3 | |
Apache HTTP server | =1.3.22 | |
Apache HTTP server | =1.3.3 | |
Apache HTTP server | =1.3.4 | |
Apache HTTP server | =1.3.18 | |
Apache HTTP server | =1.3.11 | |
Apache HTTP server | =1.3.12 | |
Apache HTTP server | =1.3.6 | |
Apache HTTP server | =1.3.29 | |
Apache HTTP server | =1.3.14 | |
Apache HTTP server | =1.3.17 | |
Apache HTTP server | =1.3.26 | |
Apache HTTP server | =1.3.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.