Apache mod_rewrite Buffer Overflow Vulnerability

Risk: High
Local: No
Remote: Yes
CWE: CWE-189

CVSS Base Score: 7.6/10
Impact Subscore: 10/10
Exploitability Subscore: 4.9/10
Exploit range: Remote
Attack complexity: High
Authentication: No required
Confidentiality impact: Complete
Integrity impact: Complete
Availability impact: Complete

McAfee, Inc. McAfee Avert(tm) Labs Security Advisory Public Release Date: 2006-07-09 Apache 1.3.29/2.X mod_rewrite Buffer Over Vulnerability CVE-2006-3747 ______________________________________________________________________ * Synopsis Mod_rewrite is an Apache module that can be used to remap requests based on regular expression matches of the requested URI. A buffer overflow vulnerability exists when dealing with rewritten URI's that are prefixed with the LDAP protocol scheme. Exploitation leads to remote access to the vulnerable machine and therefore the risk factor is critical. ______________________________________________________________________ * Vulnerable Systems Apache 1.3.29/mod_rewrite Apache 2.0.x/mod_rewrite - only 2.0.46 and higher are vulnerable Apache 2.2.x/mod_rewrite ______________________________________________________________________ * Vulnerability Information The mod_rewrite module contains an off-by-one buffer overflow vulnerability when escaping an absolute URI scheme. The vulnerability occurs within escape_absolute_uri( ) when separating out tokens within an LDAP URL. Triggering the vulnerability results in a pointer to user-controlled data to be written outside of the bounds of a character pointer array, which in many cases can be used to gain complete control of the affected host. Note that an LDAP-specific rule does not need to be exist to exploit the vulnerability. However, a rule must exist with the following properties: - A rule must exist where the user can control the initial part of the rewritten URL - The rule must not contain a forbidden or gone flag [F or G] - Rules with "noescape" [NE] flag settings are not affected. ______________________________________________________________________ * Resolution http://www.apache.org/dist/httpd/Announcement2.2.html ______________________________________________________________________ * Credits This vulnerability was discovered by Mark Dowd of McAfee Avert Labs. ______________________________________________________________________ ______________________________________________________________________ * Legal Notice Copyright (C) 2006 McAfee, Inc. The information contained within this advisory is provided for the convenience of McAfee's customers, and may be redistributed provided that no fee is charged for distribution and that the advisory is not modified in any way. McAfee makes no representations or warranties regarding the accuracy of the information referenced in this document, or the suitability of that information for your purposes. McAfee, Inc. and McAfee Avert Labs are registered Trademarks of McAfee, Inc. and/or its affiliated companies in the United States and/or other Countries. All other registered and unregistered trademarks in this document are the sole property of their respective owners. ______________________________________________________________________

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com


Back to Top