Lucene search

K
saintSAINT CorporationSAINT:B572402CE6E5C851D7572BF044507A14
HistoryJun 22, 2007 - 12:00 a.m.

Apache mod_rewrite LDAP URL buffer overflow

2007-06-2200:00:00
SAINT Corporation
www.saintcorporation.com
119

0.974 High

EPSS

Percentile

99.9%

Added: 06/22/2007
CVE: CVE-2006-3747
BID: 19204
OSVDB: 27588

Background

mod_rewrite is an Apache module which allows rule-based modification of URL requests.

Problem

An off-by-one buffer overflow vulnerability in mod_rewrite allows command execution when the **escape_absolute_uri** function attempts to separate tokens within an LDAP URL.

Resolution

Upgrade to Apache HTTP Server version 1.3.37, 2.0.59, or 2.2.3 or higher.

References

<http://archives.neohapsis.com/archives/bugtraq/2006-07/0514.html&gt;
<http://www.kb.cert.org/vuls/id/395412&gt;

Limitations

Exploit works on Apache HTTP Server 2.0.58. The vulnerability is only exploitable when there exists a rule where the user can control the initial part of the rewritten URL. The rule must not contain a forbidden or gone flag [F or G] or the β€œnoescape” [NE] flag.

Platforms

Windows