First published: Tue Sep 08 2009(Updated: )
The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. References: <a href="http://intevydis.com/vd-list.shtml">http://intevydis.com/vd-list.shtml</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP Server | >=2.0.35<2.0.64 | |
Apache HTTP Server | >=2.2.0<2.2.14 | |
Fedora | =10 | |
Fedora | =12 | |
Debian | =4.0 | |
SUSE Linux | =10.3 | |
SUSE Linux | =11.0 | |
SUSE Linux | =11.1 | |
SUSE Linux Enterprise Desktop | =10-sp2 | |
SUSE Linux Enterprise Desktop | =10-sp3 | |
SUSE Linux Enterprise Server | =9 | |
SUSE Linux Enterprise Server | =10-sp2 | |
SUSE Linux Enterprise Server | =10-sp3 | |
SUSE Linux Enterprise Server | =11 | |
Apple iOS and macOS | <10.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-3095 has a medium severity rating as it allows attackers to bypass access restrictions.
To fix CVE-2009-3095, you should upgrade to the latest version of Apache HTTP Server that has patched this vulnerability.
CVE-2009-3095 affects Apache HTTP Server versions between 2.0.35 and 2.0.64, as well as versions between 2.2.0 and 2.2.14.
Yes, CVE-2009-3095 allows attackers to send arbitrary commands to an FTP server.
To mitigate CVE-2009-3095, consider disabling the mod_proxy_ftp module if it is not needed.