Lucene search

K
saintSAINT CorporationSAINT:386ECCECD3AA34FA1E84E6D3D2B71C7B
HistoryJun 22, 2007 - 12:00 a.m.

Apache mod_rewrite LDAP URL buffer overflow

2007-06-2200:00:00
SAINT Corporation
my.saintcorporation.com
59

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.974 High

EPSS

Percentile

99.9%

Added: 06/22/2007
CVE: CVE-2006-3747
BID: 19204
OSVDB: 27588

Background

mod_rewrite is an Apache module which allows rule-based modification of URL requests.

Problem

An off-by-one buffer overflow vulnerability in mod_rewrite allows command execution when the **escape_absolute_uri** function attempts to separate tokens within an LDAP URL.

Resolution

Upgrade to Apache HTTP Server version 1.3.37, 2.0.59, or 2.2.3 or higher.

References

<http://archives.neohapsis.com/archives/bugtraq/2006-07/0514.html&gt;
<http://www.kb.cert.org/vuls/id/395412&gt;

Limitations

Exploit works on Apache HTTP Server 2.0.58. The vulnerability is only exploitable when there exists a rule where the user can control the initial part of the rewritten URL. The rule must not contain a forbidden or gone flag [F or G] or the β€œnoescape” [NE] flag.

Platforms

Windows

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.974 High

EPSS

Percentile

99.9%