A format string vulnerabilty has been found in Apache mod_tcl, which could lead to the remote execution of arbitrary code.
Package | www-apache/mod_tcl on all architectures |
---|---|
Affected versions | < 1.0.1 |
Unaffected versions | >= 1.0.1 |
Apache mod_tcl is a TCL interpreting module for the Apache 2.x web server.
Sparfell discovered format string errors in calls to the set_var function in tcl_cmds.c and tcl_core.c.
A remote attacker could exploit the vulnerability to execute arbitrary code with the rights of the user running the Apache server.
There is no known workaround at this time.
All mod_tcl users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-apache/mod_tcl-1.0.1"
Release date
October 24, 2006
Latest revision
October 24, 2006: 01
Severity
high
Exploitable
remote
Bugzilla entries