SSL: Apache mod_ssl ssl_util_uuencode_binary Buffer Overflow

This signature detects attempts to exploit a known vulnerability against Apache mod_ssl module. A successful attack can result in a denial-of-service condition on overflowing the buffer.

Extended Description

A stack-based buffer overflow has been reported in the Apache 'mod_ssl' module. This issue is exposed in utility code for uuencoding binary data. This issue would most likely result in a denial of service if triggered, but could theoretically allow arbitrary code to run. The issue is not believed to be exploitable to execute arbitrary code on x86 architectures, but this may not be the case with other architectures.

Affected Products

Mandriva linux_mandrake

References

BugTraq: 10355

CVE: CVE-2004-0488

Short Name
SSL:APACHE-MOD-SSL
Severity
Major
Recommended
False
Recommended Action
Drop
Category
SSL
Keywords
Apache Buffer CVE-2004-0488 Overflow bid:10355 mod_ssl ssl_util_uuencode_binary
Release Date
09/30/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Red_hat

Apache_software_foundation

Openbsd

Trustix

Gentoo

Hp

Turbolinux

Sgi

Tinysofa

Mandriva

Mod_ssl

Debian

Apple

CVSS Score

7.5

Found a potential security threat?