mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
208 lines
7.1 KiB
JSON
208 lines
7.1 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2011-3607",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20111102 Integer Overflow in Apache ap_pregsub via mod-setenvif",
|
|
"refsource" : "FULLDISC",
|
|
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2011-11/0023.html"
|
|
},
|
|
{
|
|
"name" : "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/",
|
|
"refsource" : "MISC",
|
|
"url" : "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/"
|
|
},
|
|
{
|
|
"name" : "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html",
|
|
"refsource" : "MISC",
|
|
"url" : "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html"
|
|
},
|
|
{
|
|
"name" : "https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/811422",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/811422"
|
|
},
|
|
{
|
|
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=750935",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=750935"
|
|
},
|
|
{
|
|
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html"
|
|
},
|
|
{
|
|
"name" : "http://support.apple.com/kb/HT5501",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://support.apple.com/kb/HT5501"
|
|
},
|
|
{
|
|
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
|
|
},
|
|
{
|
|
"name" : "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html"
|
|
},
|
|
{
|
|
"name" : "APPLE-SA-2012-09-19-2",
|
|
"refsource" : "APPLE",
|
|
"url" : "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html"
|
|
},
|
|
{
|
|
"name" : "DSA-2405",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2012/dsa-2405"
|
|
},
|
|
{
|
|
"name" : "HPSBMU02786",
|
|
"refsource" : "HP",
|
|
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
|
|
},
|
|
{
|
|
"name" : "SSRT100877",
|
|
"refsource" : "HP",
|
|
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
|
|
},
|
|
{
|
|
"name" : "HPSBOV02822",
|
|
"refsource" : "HP",
|
|
"url" : "http://marc.info/?l=bugtraq&m=134987041210674&w=2"
|
|
},
|
|
{
|
|
"name" : "SSRT100966",
|
|
"refsource" : "HP",
|
|
"url" : "http://marc.info/?l=bugtraq&m=134987041210674&w=2"
|
|
},
|
|
{
|
|
"name" : "HPSBUX02761",
|
|
"refsource" : "HP",
|
|
"url" : "http://marc.info/?l=bugtraq&m=133494237717847&w=2"
|
|
},
|
|
{
|
|
"name" : "SSRT100823",
|
|
"refsource" : "HP",
|
|
"url" : "http://marc.info/?l=bugtraq&m=133494237717847&w=2"
|
|
},
|
|
{
|
|
"name" : "HPSBMU02748",
|
|
"refsource" : "HP",
|
|
"url" : "http://marc.info/?l=bugtraq&m=133294460209056&w=2"
|
|
},
|
|
{
|
|
"name" : "SSRT100772",
|
|
"refsource" : "HP",
|
|
"url" : "http://marc.info/?l=bugtraq&m=133294460209056&w=2"
|
|
},
|
|
{
|
|
"name" : "MDVSA-2012:003",
|
|
"refsource" : "MANDRIVA",
|
|
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:003"
|
|
},
|
|
{
|
|
"name" : "MDVSA-2013:150",
|
|
"refsource" : "MANDRIVA",
|
|
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
|
|
},
|
|
{
|
|
"name" : "RHSA-2012:0128",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0128.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2012:0542",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0542.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2012:0543",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0543.html"
|
|
},
|
|
{
|
|
"name" : "50494",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/50494"
|
|
},
|
|
{
|
|
"name" : "76744",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/76744"
|
|
},
|
|
{
|
|
"name" : "1026267",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://securitytracker.com/id?1026267"
|
|
},
|
|
{
|
|
"name" : "45793",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/45793"
|
|
},
|
|
{
|
|
"name" : "48551",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/48551"
|
|
},
|
|
{
|
|
"name" : "apache-http-appregsub-bo(71093)",
|
|
"refsource" : "XF",
|
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/71093"
|
|
}
|
|
]
|
|
}
|
|
}
|