Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2004-0488

Overview

Vulnerability Score 7.5 7.5
CVE Id CVE-2004-0488
Last Modified 21 Aug 2010 12:20:37
Published 07 Jul 2004 12:00:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2004-0488

Summary

Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl, when mod_ssl is configured to trust the issuing CA, may allow remote attackers to execute arbitrary code via a client certificate with a long subject DN.

Vulnerable Systems

Operating System

  • Gentoo Linux 1.4

  • Mandrakesoft Mandrake Linux 10.0

  • Mandrakesoft Mandrake Linux 9.1

  • Mandrakesoft Mandrake Linux 9.2

  • Mandrakesoft Mandrake Linux Corporate Server 2.1

  • Openbsd 3.4

  • Openbsd 3.5

  • Openbsd Current

  • Trustix Secure Linux 1.5

  • Trustix Secure Linux 2.0

  • Trustix Secure Linux 2.1

Application

  • Apache Http Server 1.3

  • Apache Http Server 1.3.1

  • Apache Http Server 1.3.11

  • Apache Http Server 1.3.12

  • Apache Http Server 1.3.14

  • Apache Http Server 1.3.17

  • Apache Http Server 1.3.18

  • Apache Http Server 1.3.19

  • Apache Http Server 1.3.20

  • Apache Http Server 1.3.22

  • Apache Http Server 1.3.23

  • Apache Http Server 1.3.24

  • Apache Http Server 1.3.25

  • Apache Http Server 1.3.26

  • Apache Http Server 1.3.27

  • Apache Http Server 1.3.28

  • Apache Http Server 1.3.29

  • Apache Http Server 1.3.3

  • Apache Http Server 1.3.31

  • Apache Http Server 1.3.4

  • Apache Http Server 1.3.6

  • Apache Http Server 1.3.7

  • Apache Http Server 1.3.9

  • Apache Http Server 2.0

  • Apache Http Server 2.0.28

  • Apache Http Server 2.0.32

  • Apache Http Server 2.0.35

  • Apache Http Server 2.0.36

  • Apache Http Server 2.0.37

  • Apache Http Server 2.0.38

  • Apache Http Server 2.0.39

  • Apache Http Server 2.0.40

  • Apache Http Server 2.0.41

  • Apache Http Server 2.0.42

  • Apache Http Server 2.0.43

  • Apache Http Server 2.0.44

  • Apache Http Server 2.0.45

  • Apache Http Server 2.0.46

  • Apache Http Server 2.0.47

  • Apache Http Server 2.0.48

  • Apache Http Server 2.0.49

  • Apache Http Server 2.0.9

  • Mandrakesoft Mandrake Multi Network Firewall 8.2

  • Mod Ssl 2.8.10

  • Mod Ssl 2.8.12

  • Mod Ssl 2.8.15

  • Mod Ssl 2.8.16

  • Mod Ssl 2.8.7

  • Sgi Propack 2.4

  • Tinysofa Enterprise Server 1.0

  • Tinysofa Enterprise Server 1.0 U1


References

BID - 10355

FEDORA - FLSA:1888

XF - apache-modssl-uuencode-bo(16214)

TRUSTIX - 2004-0031

REDHAT - RHSA-2004:405

REDHAT - RHSA-2004:342

DEBIAN - DSA-532

GENTOO - GLSA-200406-05

REDHAT - RHSA-2004:245

HP - SSRT4788

HP - SSRT4777

BUGTRAQ - 20040601 TSSA-2004-008 - apache

FULLDISC - 20040517 mod_ssl ssl_util_uuencode_binary potential problem

SGI - 20040605-01-U

REDHAT - RHSA-2005:816

MANDRAKE - MDKSA-2004:055

MANDRAKE - MDKSA-2004:054

BUGTRAQ - 20040527 [OpenPKG-SA-2004.026] OpenPKG Security Advisory (apache)


Last Updated: 27 May 2016 10:38:37