ID
VAR-E-201111-0031
CVE
cve_id: | CVE-2011-3607 | Trust: 1.3 |
cve_id: | CVE-2011-4415 | Trust: 1.0 |
EDB ID
41769
TITLE
Apache < 2.0.64 / < 2.2.21 mod_setenvif - Integer Overflow - Linux dos Exploit
Trust: 0.6
DESCRIPTION
Apache < 2.0.64 / < 2.2.21 mod_setenvif - Integer Overflow. CVE-2011-4415CVE-2011-3607 . dos exploit for Linux platform
Trust: 0.6
AFFECTED PRODUCTS
vendor: | apache | model: | mod setenvif | scope: | lt | version: | 2.0.64/<2.2.21 | Trust: 1.6 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 9.2 | Trust: 0.6 |
vendor: | avaya | model: | voice portal | scope: | eq | version: | 5.1 | Trust: 0.6 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2 | Trust: 0.6 |
vendor: | xerox | model: | freeflow print server 73.c0.41 | scope: | - | version: | - | Trust: 0.3 |
vendor: | xerox | model: | freeflow print server 73.b3.61 | scope: | - | version: | - | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts sparc | scope: | eq | version: | 8.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts powerpc | scope: | eq | version: | 8.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts lpia | scope: | eq | version: | 8.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts i386 | scope: | eq | version: | 8.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux lts amd64 | scope: | eq | version: | 8.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux i386 | scope: | eq | version: | 11.10 | Trust: 0.3 |
vendor: | ubuntu | model: | linux amd64 | scope: | eq | version: | 11.10 | Trust: 0.3 |
vendor: | ubuntu | model: | linux powerpc | scope: | eq | version: | 11.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux i386 | scope: | eq | version: | 11.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux arm | scope: | eq | version: | 11.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux amd64 | scope: | eq | version: | 11.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux powerpc | scope: | eq | version: | 10.10 | Trust: 0.3 |
vendor: | ubuntu | model: | linux i386 | scope: | eq | version: | 10.10 | Trust: 0.3 |
vendor: | ubuntu | model: | linux arm | scope: | eq | version: | 10.10 | Trust: 0.3 |
vendor: | ubuntu | model: | linux amd64 | scope: | eq | version: | 10.10 | Trust: 0.3 |
vendor: | ubuntu | model: | linux sparc | scope: | eq | version: | 10.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux powerpc | scope: | eq | version: | 10.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux i386 | scope: | eq | version: | 10.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux arm | scope: | eq | version: | 10.04 | Trust: 0.3 |
vendor: | ubuntu | model: | linux amd64 | scope: | eq | version: | 10.04 | Trust: 0.3 |
vendor: | slackware | model: | linux x86 64 -current | scope: | - | version: | - | Trust: 0.3 |
vendor: | slackware | model: | linux x86 64 | scope: | eq | version: | 13.37 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.37 | Trust: 0.3 |
vendor: | slackware | model: | linux x86 64 | scope: | eq | version: | 13.1 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.1 | Trust: 0.3 |
vendor: | slackware | model: | linux x86 64 | scope: | eq | version: | 13.0 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 13.0 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 12.2 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 12.1 | Trust: 0.3 |
vendor: | slackware | model: | linux | scope: | eq | version: | 12.0 | Trust: 0.3 |
vendor: | slackware | model: | linux -current | scope: | - | version: | - | Trust: 0.3 |
vendor: | redhat | model: | enterprise linux desktop workstation client | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | red | model: | hat jboss enterprise web server for rhel | scope: | eq | version: | 61.0 | Trust: 0.3 |
vendor: | red | model: | hat jboss enterprise web server for rhel server | scope: | eq | version: | 51.0 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux workstation | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux server | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux hpc node optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux hpc node | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux desktop optional | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux desktop | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux desktop client | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | red | model: | hat enterprise linux server | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 6 | Trust: 0.3 |
vendor: | oracle | model: | enterprise linux | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake x86 64 | scope: | eq | version: | 2011 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake | scope: | eq | version: | 2011 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake x86 64 | scope: | eq | version: | 2010.1 | Trust: 0.3 |
vendor: | mandriva | model: | linux mandrake | scope: | eq | version: | 2010.1 | Trust: 0.3 |
vendor: | mandrakesoft | model: | enterprise server x86 64 | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | mandrakesoft | model: | enterprise server | scope: | eq | version: | 5 | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | eq | version: | 7.0.11 | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | eq | version: | 7.0.0.5 | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | eq | version: | 7.0.0.19 | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | eq | version: | 7.0.0.17 | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | eq | version: | 7.0.0.15 | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | eq | version: | 7.0.0.13 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.3 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | hp | model: | system management homepage | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | hp | model: | openvms secure web server | scope: | eq | version: | 2.2 | Trust: 0.3 |
vendor: | hp | model: | hp-ux b.11.31 | scope: | - | version: | - | Trust: 0.3 |
vendor: | hp | model: | hp-ux b.11.23 | scope: | - | version: | - | Trust: 0.3 |
vendor: | hp | model: | hp-ux b.11.11 | scope: | - | version: | - | Trust: 0.3 |
vendor: | gentoo | model: | linux | scope: | - | version: | - | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 9.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio standard-j edition | scope: | eq | version: | 8.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio standard-j edition b | scope: | eq | version: | 9.1.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio enterprise edition | scope: | eq | version: | 9.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio enterprise edition | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage studio enterprise edition | scope: | eq | version: | 8.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage business application server enterprise edition | scope: | eq | version: | 8.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage apworks modelers-j edition | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 9.2 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 9.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 8.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition | scope: | eq | version: | 8.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard-j edition 9.1.0b | scope: | - | version: | - | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server standard edition | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus developer | scope: | eq | version: | 5.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus developer | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus developer | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 7.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 6.0.2 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 6.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 5.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server plus | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 9.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 9.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 9.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 8.0.3 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 8.0.2 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 8.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 7.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 6.0.2 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 6.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 5.0.1 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l11 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l10b | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l10a | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition l10 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | fujitsu | model: | interstage application server enterprise edition | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | debian | model: | linux sparc | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux s/390 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux powerpc | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux mips | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux ia-64 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux ia-32 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux arm | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | debian | model: | linux amd64 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | voice portal | scope: | eq | version: | 5.1.2 | Trust: 0.3 |
vendor: | avaya | model: | voice portal | scope: | eq | version: | 5.1.1 | Trust: 0.3 |
vendor: | avaya | model: | voice portal sp1 | scope: | eq | version: | 5.1 | Trust: 0.3 |
vendor: | avaya | model: | voice portal sp2 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | avaya | model: | voice portal sp1 | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | avaya | model: | voice portal | scope: | eq | version: | 5.0 | Trust: 0.3 |
vendor: | avaya | model: | ip office application server | scope: | eq | version: | 8.0 | Trust: 0.3 |
vendor: | avaya | model: | ip office application server | scope: | eq | version: | 7.0 | Trust: 0.3 |
vendor: | avaya | model: | ip office application server | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | avaya | model: | ip office application server | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 6.1.3 | Trust: 0.3 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 6.1.2 | Trust: 0.3 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 6.1.1 | Trust: 0.3 |
vendor: | avaya | model: | aura session manager sp2 | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | avaya | model: | aura session manager sp1 | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | avaya | model: | aura session manager sp1 | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura session manager sp2 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | aura session manager sp1 | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 1.1 | Trust: 0.3 |
vendor: | avaya | model: | aura session manager | scope: | eq | version: | 1.0 | Trust: 0.3 |
vendor: | avaya | model: | aura messaging | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | avaya | model: | aura messaging | scope: | eq | version: | 6.0.1 | Trust: 0.3 |
vendor: | avaya | model: | aura messaging | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura experience portal | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura communication manager utility services | scope: | eq | version: | 6.2 | Trust: 0.3 |
vendor: | avaya | model: | aura communication manager utility services | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | avaya | model: | aura communication manager utility services | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura communication manager | scope: | eq | version: | 6.0.1 | Trust: 0.3 |
vendor: | avaya | model: | aura communication manager | scope: | eq | version: | 6.0 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 5.2.1 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 6.1.1 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 6.1 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 5.2.3 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 5.2.2 | Trust: 0.3 |
vendor: | avaya | model: | aura application enablement services | scope: | eq | version: | 5.2 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.7.3 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.7.2 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.7.1 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.7 | Trust: 0.3 |
vendor: | apple | model: | mac os server | scope: | eq | version: | x10.6.8 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.7.4 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.7.3 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.7.2 | Trust: 0.3 |
vendor: | apple | model: | mac os | scope: | eq | version: | x10.7.1 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.15 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.14 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.13 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.12 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.11 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.10 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.9 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.8 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.6 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.5 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.4 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.3 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.2 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.9 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.8 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.7 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.6 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.5 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.4 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.3 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.2 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1.1 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.1 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.63 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.61 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.60 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.59 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.58 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.57 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.56 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.55 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.54 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.53 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.52 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.51 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.50 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.49 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.48 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.47 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.46 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.45 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.44 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.43 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.42 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.41 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.40 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.39 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.38 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.37 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.36 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.35 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache -beta | scope: | eq | version: | 2.0.34 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache -beta | scope: | eq | version: | 2.0.32 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.32 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache -beta | scope: | eq | version: | 2.0.28 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache beta | scope: | eq | version: | 2.0.28 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.28 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.9 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.21 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.18 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.16 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.2.1 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | eq | version: | 2.0.64 | Trust: 0.3 |
vendor: | ibm | model: | http server | scope: | ne | version: | 7.0.0.21 | Trust: 0.3 |
vendor: | apache | model: | software foundation apache | scope: | ne | version: | 2.2.22 | Trust: 0.3 |
EXPLOIT
Source: http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/
## Background
The Apache HTTP Server is an open-source HTTP server for modern operating systems including UNIX, Microsoft Windows, Mac OS/X and Netware. The goal of this project is to provide a secure, efficient and extensible server that provides HTTP services observing the current HTTP standards. Apache has been the most popular web server on the Internet since April of 1996.
## Problem Description
During routine testing, an integer overflow was found in apache2-mpm-worker 2.2.19 in the function ap_pregsub called from mod-setenvif. The issue affects all versions from 2.0.x to 2.0.64 and 2.2.x to 2.2.21, not depending on the mode of operation (worker, prefork, ..). When a header field is mangled using SetEnvIf, the new environment variable data can be multiples of the size of the submitted header field. When ap_pregsub from server/util.c calculates the buffer size using
else if (no < nmatch && pmatch[no].rm_so < pmatch[no].rm_eo) {
len += pmatch[no].rm_eo - pmatch[no].rm_so;
}
the length value overflows and is used in a subsequent allocation call of buffer too small:
dest = dst = apr_pcalloc(p, len + 1);
The subsequent filling of the buffer with user-supplied data leads to buffer overflow. Even without overflowing, the allocation of significant amounts of server memory for excessivly large environment variables should be considered a problem also.
## Impact
Depending on the input data, exploitation of this issue leads to:
- allocation of large quantities of server memory, killing processes due to out-of-memory conditions or reducing system performance to crawl due to massive swapping.
- invalid memory access when copying more than 4GB of data into the much smaller buffer. Since the loop copying the data uses only stack and libc-heap, not the apr pool, for source and destination addresses, copy process is linear, starting at low address and pool is separated by unaccessible memory pages for protection on linux. Usually this will only cause termination of the apache process, which is restarted automatically. The impact is increased system load and DOS-condition while under attack.
- At least with multi-threaded server (worker), arbitrary code execution is proven, on single-threaded varians, the use of crafted stop-sequences might allow code execution even on these systems. On many systems ASLR will reduce the efficiency of the attack, but even with ASLR enabled, the automatic restart of processes allows to probe for all possible mappings of libc. An attacker, that has already access to another account on the machen, might be able to use ApacheNoFollowSymlinkTimerace to learn the memory map of the process, thus having the posibility to reach nearly 100% efficiency.
To trigger this issue, mod_setenvif must be enabled and the attacker has to be able to place a crafted .htaccess file on the server. Since the triggering of the exploit might depend on a magic header field, the malicious .htaccess might be placed as backdoor in web-content .zip files or could be stored dormant on the server until activation by the corresponding magic request.
Source: http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html
## Starting Point
During routine testing, an integer overflow in apache2-mpm-worker 2.2.19 mod-setenvif was found. The crash occured when mangling request headers using a crafted .htaccess-file (http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/SingleThread-htaccess). The broken code was ap_pregsub in server/util.c, where the buffer size of a new header field could overflow, the value was then used for memory allocation. When copying data to the buffer an, overwrite of the an apr (apache portable runtime) memory-pool boundaries occured, similar to standard heap buffer overflows.
## Outline of Exploit
The main goals creating the exploit were:
- Exploit has to be triggerable via HTTP GET requests only
- Exploit data has to be 0-byte free to have valid HTTP-protocol
- No alternative way of heap-spraying is used, e.g. GET + content-length. All variants I knew of had much too low efficiency
- Use libc for ROP, although all libc-addresses start with 0-byte, which cannot be sent via HTTP
- Rely only on libc address guess, but not heap/stack address guess, unless guess could be made nearly 100% reliable
- Use the already open HTTP-connections and turn them into command connections on the fly
- Have exploit in less than 256 bytes
Two different exploit layouts were developed. The first one used multiple threads, so that one was overwriting the data of the second thread before hitting the end of the memory area. Precise timing was essential to get shell access.
The second one used a more crafted substitution expression, stopping the copy in a single thread by modifying the regular expression currently processed in the thread. Since there is race condition involved, this exploit was far more reliable than the first one.
Trust: 1.0
EXPLOIT LANGUAGE
txt
Trust: 0.6
PRICE
free
Trust: 0.6
TYPE
Integer Overflow
Trust: 1.6
CREDITS
halfdog
Trust: 0.6
EXTERNAL IDS
db: | EXPLOIT-DB | id: | 41769 | Trust: 1.6 |
db: | NVD | id: | CVE-2011-3607 | Trust: 1.3 |
db: | NVD | id: | CVE-2011-4415 | Trust: 1.0 |
db: | EDBNET | id: | 92323 | Trust: 0.6 |
db: | BID | id: | 50494 | Trust: 0.3 |
REFERENCES
url: | http://www.halfdog.net/security/2011/apachemodsetenvifintegeroverflow/ | Trust: 1.3 |
url: | https://nvd.nist.gov/vuln/detail/cve-2011-3607 | Trust: 1.0 |
url: | https://nvd.nist.gov/vuln/detail/cve-2011-4415 | Trust: 1.0 |
url: | https://www.exploit-db.com/exploits/41769/ | Trust: 0.6 |
url: | http://www.halfdog.net/security/2011/apachemodsetenvifintegeroverflow/demoexploit.html | Trust: 0.3 |
url: | https://support.avaya.com/css/p8/documents/100155944 | Trust: 0.3 |
url: | http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c03231301&ac.admitted=1332965374461.876444892.492883150 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg27014506 | Trust: 0.3 |
url: | https://h20565.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?javax.portlet.tpst=ba847bafb2a2d782fcbb0710b053ce01&javax.portlet.prp_ba847bafb2a2d782fcbb0710b053ce01=wsrp-navigational | Trust: 0.3 |
url: | http://support.avaya.com/css/p8/documents/100158872 | Trust: 0.3 |
url: | http://www-01.ibm.com/support/docview.wss?uid=swg1pm50426 | Trust: 0.3 |
url: | http://httpd.apache.org/ | Trust: 0.3 |
url: | http://support.avaya.com/css/p8/documents/100157326 | Trust: 0.3 |
SOURCES
db: | BID | id: | 50494 |
db: | EXPLOIT-DB | id: | 41769 |
db: | EDBNET | id: | 92323 |
LAST UPDATE DATE
2022-07-27T09:25:03.711000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 50494 | date: | 2015-04-13T20:49:00 |
SOURCES RELEASE DATE
db: | BID | id: | 50494 | date: | 2011-11-02T00:00:00 |
db: | EXPLOIT-DB | id: | 41769 | date: | 2011-11-02T00:00:00 |
db: | EDBNET | id: | 92323 | date: | 2017-03-29T00:00:00 |