A format string vulnerabilty has been found in Apache mod_tcl, which could lead to the remote execution of arbitrary code.
|Package||www-apache/mod_tcl on all architectures|
|Affected versions||< 1.0.1|
|Unaffected versions||>= 1.0.1|
Apache mod_tcl is a TCL interpreting module for the Apache 2.x web server.
Sparfell discovered format string errors in calls to the set_var function in tcl_cmds.c and tcl_core.c.
A remote attacker could exploit the vulnerability to execute arbitrary code with the rights of the user running the Apache server.
There is no known workaround at this time.
All mod_tcl users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-apache/mod_tcl-1.0.1"
October 24, 2006
October 24, 2006: 01