CVE-2004-0940
high-risk
Published 2005-02-09
Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
Do I need to act?
~
3.7% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (20)
References (42)
Mailing List
http://marc.info/?l=bugtraq&m=109906660225051&w=2
Broken Link
http://secunia.com/advisories/12898/
Broken Link
http://secunia.com/advisories/19073
Broken Link
http://securitytracker.com/id?1011783
Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm
Mailing List
http://www.debian.org/security/2004/dsa-594
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2004:134
Broken Link
http://www.securityfocus.com/bid/11471
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/17785
and 22 more references
58
/ 100
high-risk
Severity
24/34 · High
Exploitability
14/34 · Moderate
Exposure
20/34 · Moderate