Vulnerability Description
Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl, when mod_ssl is configured to trust the issuing CA, may allow remote attackers to execute arbitrary code via a client certificate with a long subject DN.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Http Server | >= 2.0.35, < 2.0.50 |
| Debian | Debian Linux | 3.0 |
| Redhat | Enterprise Linux Server | 2.0 |
| Redhat | Enterprise Linux Workstation | 2.0 |
Related Weaknesses (CWE)
References
- ftp://patches.sgi.com/support/free/security/advisories/20040605-01-U.ascBroken Link
- http://lists.grok.org.uk/pipermail/full-disclosure/2004-May/021610.htmlThird Party Advisory
- http://marc.info/?l=bugtraq&m=108567431823750&w=2Issue TrackingMailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=108619129727620&w=2Issue TrackingMailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=109181600614477&w=2Issue TrackingMailing ListThird Party Advisory
- http://marc.info/?l=bugtraq&m=109215056218824&w=2Issue TrackingMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2004-245.htmlThird Party Advisory
- http://security.gentoo.org/glsa/glsa-200406-05.xmlThird Party Advisory
- http://www.debian.org/security/2004/dsa-532Third Party Advisory
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:054Broken Link
- http://www.mandriva.com/security/advisories?name=MDKSA-2004:055Broken Link
- http://www.redhat.com/support/errata/RHSA-2004-342.htmlThird Party Advisory
- http://www.redhat.com/support/errata/RHSA-2004-405.htmlThird Party Advisory
- http://www.redhat.com/support/errata/RHSA-2005-816.htmlThird Party Advisory
- http://www.securityfocus.com/bid/10355PatchThird Party AdvisoryVDB Entry
FAQ
What is CVE-2004-0488?
CVE-2004-0488 is a vulnerability with a CVSS score of 7.5 (HIGH). Stack-based buffer overflow in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl, when mod_ssl is configured to trust the issuing CA, may allow remote attackers to execute arbitra...
How severe is CVE-2004-0488?
CVE-2004-0488 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-0488?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Http Server, Debian Debian Linux, Redhat Enterprise Linux Server, Redhat Enterprise Linux Workstation.