Apache 1.3: Buffer overflow vulnerability in mod_include — GLSA 200411-03

A buffer overflow vulnerability exists in mod_include which could possibly allow a local attacker to gain escalated privileges.

Affected packages

www-servers/apache on all architectures
Affected versions < 1.3.32-r1
Unaffected versions >= 1.3.32-r1

Background

The Apache HTTP server is one of the most popular web servers on the internet. mod_include is an Apache module to handle Server Side Includes (SSI).

Description

A possible buffer overflow exists in the get_tag() function of mod_include.c.

Impact

If Server Side Includes (SSI) are enabled, a local attacker may be able to run arbitrary code with the rights of an httpd child process by making use of a specially-crafted document with malformed SSI.

Workaround

There is no known workaround at this time.

Resolution

All Apache users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-servers/apache-1.3.32-r1"

References

Release date
November 02, 2004

Latest revision
December 30, 2007: 02

Severity
normal

Exploitable
local

Bugzilla entries