Vulnerability Description
The log files in Apache web server contain information directly supplied by clients and does not filter or quote control characters, which could allow remote attackers to hide HTTP requests and spoof source IP addresses when logs are viewed with UNIX programs such as cat, tail, and grep.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Http Server | >= 1.3.0, < 1.3.31 |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/bugtraq/2001-10/0231.htmlBroken Link
- http://httpd.apache.org/docs/logs.htmlVendor Advisory
- http://www.iss.net/security_center/static/7363.phpBroken Link
- http://archives.neohapsis.com/archives/bugtraq/2001-10/0231.htmlBroken Link
- http://httpd.apache.org/docs/logs.htmlVendor Advisory
- http://www.iss.net/security_center/static/7363.phpBroken Link
FAQ
What is CVE-2001-1556?
CVE-2001-1556 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The log files in Apache web server contain information directly supplied by clients and does not filter or quote control characters, which could allow remote attackers to hide HTTP requests and spoof ...
How severe is CVE-2001-1556?
CVE-2001-1556 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-1556?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Http Server.