First published: Wed Jun 23 2004(Updated: )
Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Hp Webproxy | =2.0 | |
HP VirtualVault | =11.0.4 | |
Apache HTTP server | =1.3.27 | |
IBM HTTP Server | =1.3.28 | |
Apache HTTP server | =1.3.28 | |
Apache HTTP server | =1.3.31 | |
Hp Webproxy | =2.1 | |
IBM HTTP Server | =1.3.26.1 | |
Apache HTTP server | =1.3.26 | |
Apache HTTP server | =1.3.29 | |
SGI ProPack | =2.4 | |
IBM HTTP Server | =1.3.26 | |
IBM HTTP Server | =1.3.26.2 | |
Hp Vvos | =11.04 | |
Openbsd Openbsd | =3.5 | |
Openbsd Openbsd | ||
Openbsd Openbsd | =3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.