ID CVE-2002-1658 Type cve Reporter NVD Modified 2017-07-10T21:29:19
Description
Buffer overflow in htdigest in Apache 1.3.26 and 1.3.27 may allow attackers to execute arbitrary code via a long user argument. NOTE: since htdigest is normally only locally accessible and not setuid or setgid, there are few attack vectors which would lead to an escalation of privileges, unless htdigest is executed from a CGI program. Therefore this may not be a vulnerability.
{"id": "CVE-2002-1658", "bulletinFamily": "NVD", "title": "CVE-2002-1658", "description": "Buffer overflow in htdigest in Apache 1.3.26 and 1.3.27 may allow attackers to execute arbitrary code via a long user argument. NOTE: since htdigest is normally only locally accessible and not setuid or setgid, there are few attack vectors which would lead to an escalation of privileges, unless htdigest is executed from a CGI program. Therefore this may not be a vulnerability.", "published": "2002-12-31T00:00:00", "modified": "2017-07-10T21:29:19", "cvss": {"score": 4.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1658", "reporter": "NVD", "references": ["http://www.securityfocus.com/bid/5993", "http://marc.info/?l=bugtraq&m=103480856102007&w=2", "https://exchange.xforce.ibmcloud.com/vulnerabilities/10414", "https://sardonix.org/audit/apache-45.html"], "cvelist": ["CVE-2002-1658"], "type": "cve", "lastseen": "2017-07-11T11:14:12", "history": [{"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:apache:http_server:1.3.27", "cpe:/a:apache:http_server:1.3.3", "cpe:/a:apache:http_server:1.3.24", "cpe:/a:apache:http_server:1.3.22", "cpe:/a:apache:http_server:1.3.17", "cpe:/a:apache:http_server:1.3.6", "cpe:/a:apache:http_server:1.3.14", "cpe:/a:apache:http_server:1.3.1", "cpe:/a:apache:http_server:1.3.20", "cpe:/a:apache:http_server:1.3.19", "cpe:/a:apache:http_server:1.3.25", "cpe:/a:apache:http_server:1.3.4", "cpe:/a:apache:http_server:1.3.12", "cpe:/a:apache:http_server:1.3.26", "cpe:/a:apache:http_server:1.3.11", "cpe:/a:apache:http_server:1.3.18", "cpe:/a:apache:http_server:1.3.23", "cpe:/a:apache:http_server:1.3.9"], "cvelist": ["CVE-2002-1658"], "cvss": {"score": 4.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "description": "Buffer overflow in htdigest in Apache 1.3.26 and 1.3.27 may allow attackers to execute arbitrary code via a long user argument. NOTE: since htdigest is normally only locally accessible and not setuid or setgid, there are few attack vectors which would lead to an escalation of privileges, unless htdigest is executed from a CGI program. Therefore this may not be a vulnerability.", "edition": 1, "hash": "c82ce4920d22fb9ade6e876aa5721a467df64b734e8a114633273a9a6898531a", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "e6536f105fc7889ec085405317b0927c", "key": "href"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "608e7b4e340e0b98025f2c5dd2a18675", "key": "references"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "eda82b1b957f96cf2cb9225b2fd5dfc2", "key": "modified"}, {"hash": "767a8d7b20670fcf9a665af88f9d5b3f", "key": "title"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "f72d63de4a9cadb9ccc9a4e6b0807f61", "key": "description"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "029c7d626d4c573cf28672ed6a1ceef2", "key": "cvelist"}, {"hash": "292f2e293571b0e70e3182b615982dad", "key": "cvss"}, {"hash": "acc4130deae029fcb579f5daed93f172", "key": "published"}, {"hash": "9ef2885e44de6c97000a91ce01b84487", "key": "cpe"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1658", "id": "CVE-2002-1658", "lastseen": "2016-09-03T03:40:51", "modified": "2008-09-05T16:31:11", "objectVersion": "1.2", "published": "2002-12-31T00:00:00", "references": ["http://www.securityfocus.com/bid/5993", "http://xforce.iss.net/xforce/xfdb/10414", "http://marc.theaimsgroup.com/?l=bugtraq&m=103480856102007&w=2", "https://sardonix.org/audit/apache-45.html"], "reporter": "NVD", "scanner": [], "title": "CVE-2002-1658", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 1, "lastseen": "2016-09-03T03:40:51"}, {"bulletin": {"assessment": {"href": "", "name": "", "system": ""}, "bulletinFamily": "NVD", "cpe": ["cpe:/a:apache:http_server:1.3.27", "cpe:/a:apache:http_server:1.3.3", "cpe:/a:apache:http_server:1.3.24", "cpe:/a:apache:http_server:1.3.22", "cpe:/a:apache:http_server:1.3.17", "cpe:/a:apache:http_server:1.3.6", "cpe:/a:apache:http_server:1.3.14", "cpe:/a:apache:http_server:1.3.1", "cpe:/a:apache:http_server:1.3.20", "cpe:/a:apache:http_server:1.3.19", "cpe:/a:apache:http_server:1.3.25", "cpe:/a:apache:http_server:1.3.4", "cpe:/a:apache:http_server:1.3.12", "cpe:/a:apache:http_server:1.3.26", "cpe:/a:apache:http_server:1.3.11", "cpe:/a:apache:http_server:1.3.18", "cpe:/a:apache:http_server:1.3.23", "cpe:/a:apache:http_server:1.3.9"], "cvelist": ["CVE-2002-1658"], "cvss": {"score": 4.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "description": "Buffer overflow in htdigest in Apache 1.3.26 and 1.3.27 may allow attackers to execute arbitrary code via a long user argument. NOTE: since htdigest is normally only locally accessible and not setuid or setgid, there are few attack vectors which would lead to an escalation of privileges, unless htdigest is executed from a CGI program. Therefore this may not be a vulnerability.", "edition": 2, "enchantments": {}, "hash": "db87558a74057478655368326b9b047c83a86497bdd8f26bda8c7bae7c9e06c5", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "scanner"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "reporter"}, {"hash": "d1e2209fff91843207cd48f4e4e9e7a2", "key": "modified"}, {"hash": "e6536f105fc7889ec085405317b0927c", "key": "href"}, {"hash": "28a78910cfac20bbc2468c7a8abb6835", "key": "references"}, {"hash": "6d3f4796275bb54c21a33b82f399cc6d", "key": "assessment"}, {"hash": "767a8d7b20670fcf9a665af88f9d5b3f", "key": "title"}, {"hash": "1716b5fcbb7121af74efdc153d0166c5", "key": "type"}, {"hash": "f72d63de4a9cadb9ccc9a4e6b0807f61", "key": "description"}, {"hash": "601892ece72be3be2f57266ca2354792", "key": "bulletinFamily"}, {"hash": "029c7d626d4c573cf28672ed6a1ceef2", "key": "cvelist"}, {"hash": "292f2e293571b0e70e3182b615982dad", "key": "cvss"}, {"hash": "acc4130deae029fcb579f5daed93f172", "key": "published"}, {"hash": "9ef2885e44de6c97000a91ce01b84487", "key": "cpe"}], "history": [], "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1658", "id": "CVE-2002-1658", "lastseen": "2017-04-18T15:49:51", "modified": "2016-10-17T22:27:24", "objectVersion": "1.2", "published": "2002-12-31T00:00:00", "references": ["http://www.securityfocus.com/bid/5993", "http://marc.info/?l=bugtraq&m=103480856102007&w=2", "http://xforce.iss.net/xforce/xfdb/10414", "https://sardonix.org/audit/apache-45.html"], "reporter": "NVD", "scanner": [], "title": "CVE-2002-1658", "type": "cve", "viewCount": 0}, "differentElements": ["references", "modified"], "edition": 2, "lastseen": "2017-04-18T15:49:51"}], "edition": 3, "hashmap": [{"key": "assessment", "hash": "6d3f4796275bb54c21a33b82f399cc6d"}, {"key": "bulletinFamily", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "cpe", "hash": "9ef2885e44de6c97000a91ce01b84487"}, {"key": "cvelist", "hash": "029c7d626d4c573cf28672ed6a1ceef2"}, {"key": "cvss", "hash": "292f2e293571b0e70e3182b615982dad"}, {"key": "description", "hash": "f72d63de4a9cadb9ccc9a4e6b0807f61"}, {"key": "href", "hash": "e6536f105fc7889ec085405317b0927c"}, {"key": "modified", "hash": "1af63bc73fe471e0a5281cc3647f6436"}, {"key": "published", "hash": "acc4130deae029fcb579f5daed93f172"}, {"key": "references", "hash": "42a16ec71fe6f19744c4d696b2d348a5"}, {"key": "reporter", "hash": "601892ece72be3be2f57266ca2354792"}, {"key": "scanner", "hash": "d41d8cd98f00b204e9800998ecf8427e"}, {"key": "title", "hash": "767a8d7b20670fcf9a665af88f9d5b3f"}, {"key": "type", "hash": "1716b5fcbb7121af74efdc153d0166c5"}], "hash": "348e6203660a63ca67c25d5a203c7db8b29704363568d19f4f4bbe39ed63fe7f", "viewCount": 0, "enchantments": {"score": {"value": 7.2, "vector": "NONE", "modified": "2017-07-11T11:14:12"}, "dependencies": {"references": [{"type": "osvdb", "idList": ["OSVDB:18233"]}], "modified": "2017-07-11T11:14:12"}, "vulnersScore": 7.2}, "objectVersion": "1.3", "cpe": ["cpe:/a:apache:http_server:1.3.27", "cpe:/a:apache:http_server:1.3.3", "cpe:/a:apache:http_server:1.3.24", "cpe:/a:apache:http_server:1.3.22", "cpe:/a:apache:http_server:1.3.17", "cpe:/a:apache:http_server:1.3.6", "cpe:/a:apache:http_server:1.3.14", "cpe:/a:apache:http_server:1.3.1", "cpe:/a:apache:http_server:1.3.20", "cpe:/a:apache:http_server:1.3.19", "cpe:/a:apache:http_server:1.3.25", "cpe:/a:apache:http_server:1.3.4", "cpe:/a:apache:http_server:1.3.12", "cpe:/a:apache:http_server:1.3.26", "cpe:/a:apache:http_server:1.3.11", "cpe:/a:apache:http_server:1.3.18", "cpe:/a:apache:http_server:1.3.23", "cpe:/a:apache:http_server:1.3.9"], "assessment": {"href": "", "name": "", "system": ""}, "scanner": []}
{"osvdb": [{"lastseen": "2017-04-28T13:20:14", "bulletinFamily": "software", "description": "## Vulnerability Description\nA local overflow exists in Apache htdigest. The program fails to validate the length of the supplied 'user' variable resulting in a buffer overflow. With a specially crafted request, an attacker may be able to cause arbitrary code execution resulting in a loss of integrity.\n## Technical Description\nThe program htdigest is not SUID/SGID by default and can not be leveraged for additional privileges as a result of a default installation. This vulnerability only manifests if an administrator adds SUID or SGID privileges to the program, or if another program invokes it with increased privileges. It could also allow an attack vector if called from a web page.\n## Solution Description\nUpgrade to version 1.3.28 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.\n## Short Description\nA local overflow exists in Apache htdigest. The program fails to validate the length of the supplied 'user' variable resulting in a buffer overflow. With a specially crafted request, an attacker may be able to cause arbitrary code execution resulting in a loss of integrity.\n## References:\nVendor URL: http://httpd.apache.org/\nMail List Post: http://marc.theaimsgroup.com/?l=bugtraq&m=103480856102007&w=2\nISS X-Force ID: 10414\n[CVE-2002-1658](https://vulners.com/cve/CVE-2002-1658)\nBugtraq ID: 5993\n", "modified": "2002-10-16T22:32:26", "published": "2002-10-16T22:32:26", "href": "https://vulners.com/osvdb/OSVDB:18233", "id": "OSVDB:18233", "type": "osvdb", "title": "Apache HTTP Server htdigest user Variable Overfow", "cvss": {"score": 4.6, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}}]}