First published: Fri Aug 05 2005(Updated: )
Off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback in Apache, when configured to use a CRL, allows remote attackers to cause a denial of service (child process crash) via a CRL that causes a buffer overflow of one null byte.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP Server | >=2.0.35<=2.0.54 | |
redhat enterprise Linux desktop | =3.0 | |
redhat enterprise Linux desktop | =4.0 | |
redhat enterprise Linux server | =4.0 | |
redhat enterprise Linux workstation | =4.0 | |
redhat enterprise Linux workstation | =3.0 | |
redhat enterprise Linux server | =3.0 | |
Debian Debian Linux | =3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1268 has a moderate severity rating due to its potential to cause denial of service through process crashes.
To fix CVE-2005-1268, upgrade to a version of Apache HTTP Server that is patched for this vulnerability.
CVE-2005-1268 affects Apache HTTP Server versions between 2.0.35 and 2.0.54, along with specific Red Hat and Debian Linux distributions.
Yes, CVE-2005-1268 can be exploited remotely by attackers through a malicious Certificate Revocation List.
CVE-2005-1268 is an off-by-one error in the mod_ssl Certificate Revocation List verification process that can lead to a buffer overflow.