SSL: Apache mod_ssl ssl_util_uuencode_binary Buffer Overflow
This signature detects attempts to exploit a known vulnerability against Apache mod_ssl module. A successful attack can result in a denial-of-service condition on overflowing the buffer.
Extended Description
A stack-based buffer overflow has been reported in the Apache 'mod_ssl' module. This issue is exposed in utility code for uuencoding binary data. This issue would most likely result in a denial of service if triggered, but could theoretically allow arbitrary code to run. The issue is not believed to be exploitable to execute arbitrary code on x86 architectures, but this may not be the case with other architectures.
Affected Products
Mandriva linux_mandrake
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Apache_software_foundation
Openbsd
Trustix
Gentoo
Hp
Turbolinux
Sgi
Tinysofa
Mandriva
Mod_ssl
Debian
Apple
7.5