HTTP: Vulnerable Apache Version ( 1.3.26 through 1.3.31)
This signature detects Apache server versions 1.3.26 through 1.3.31. These versions contain a remote buffer overflow vulnerability. Attackers can exploit this vulnerability to crash the server process, enabling them to execute arbitrary code or cause a denial of service.
Extended Description
A remote buffer overflow vulnerability exists in Apache mod_proxy. The source of this issue is that a negative user-specified length value may be used in a memory copy operation, allowing for corruption of memory. This may triggered if a remote server returns a negative Content-Length: HTTP header field to be passed through the proxy. Exploitation will likely result in a denial of service, though there is an unconfirmed potential for execution of arbitrary code on some platforms (such as BSD implementations). Versions that have the optional AP_ENABLE_EXCEPTION_HOOK define enabled may also be exploitable on some platforms. This issue affects Apache servers 1.3.26 through 1.3.32 that have mod_proxy enabled and configured. Apache 2.0.x releases are not affected by this issue.
Affected Products
Apache_software_foundation apache
References
BugTraq: 10508
CVE: CVE-2004-0492
URL: http://www.debian.org/security/2004/dsa-525 http://www.guninski.com/modproxy1.html
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Apache_software_foundation
Red_hat
Openbsd
Ibm
Trustix
Sun
Hp
Sgi
Slackware
10.0