First published: Fri May 28 2004(Updated: )
Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl, when mod_ssl is configured to trust the issuing CA, may allow remote attackers to execute arbitrary code via a client certificate with a long subject DN.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP Server | >=2.0.35<2.0.50 | |
Debian | =3.0 | |
redhat enterprise Linux server | =2.0 | |
redhat enterprise Linux workstation | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0488 is considered a high severity vulnerability due to its potential to allow remote attackers to execute arbitrary code.
To fix CVE-2004-0488, upgrade your version of Apache mod_ssl to a secure version beyond 2.0.50.
CVE-2004-0488 affects Apache HTTP Server versions between 2.0.35 and 2.0.50, as well as certain versions of Debian and Red Hat Enterprise Linux.
CVE-2004-0488 exploits a stack-based buffer overflow in the ssl_util_uuencode_binary function when mod_ssl is improperly configured.
Yes, CVE-2004-0488 can be exploited remotely through a client certificate with a long subject DN.