First published: Wed Jun 23 2004(Updated: )
Heap-based buffer overflow in proxy_util.c for mod_proxy in Apache 1.3.25 to 1.3.31 allows remote attackers to cause a denial of service (process crash) and possibly execute arbitrary code via a negative Content-Length HTTP header field, which causes a large amount of data to be copied.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server | =1.3.26 | |
Apache Http Server | =1.3.27 | |
Apache Http Server | =1.3.28 | |
Apache Http Server | =1.3.29 | |
Apache Http Server | =1.3.31 | |
HP VirtualVault | =11.0.4 | |
HP Praesidium Webproxy | =2.0 | |
HP Praesidium Webproxy | =2.1 | |
IBM HTTP Server | =1.3.26 | |
IBM HTTP Server | =1.3.26.1 | |
IBM HTTP Server | =1.3.26.2 | |
IBM HTTP Server | =1.3.28 | |
SGI ProPack | =2.4 | |
HP Virtual Voice Overhead System | =11.04 | |
OpenBSD | ||
OpenBSD | =3.4 | |
OpenBSD | =3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0492 has been rated as a moderate severity vulnerability due to its potential to cause denial of service and possible arbitrary code execution.
The recommended fix for CVE-2004-0492 is to upgrade to a safe version of Apache HTTP Server that is not affected, specifically versions 1.3.32 or later.
CVE-2004-0492 affects Apache HTTP Server versions 1.3.25 to 1.3.31 and several other products that utilize affected versions of Apache.
While CVE-2004-0492 primarily causes denial of service, it also carries the risk of executing arbitrary code, which could potentially lead to data breaches.
An attacker can exploit CVE-2004-0492 to crash the server or potentially execute malicious code by sending specially crafted HTTP requests.