cvelist/2011/3xxx/CVE-2011-3607.json

208 lines
7.1 KiB
JSON

{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2011-3607",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "20111102 Integer Overflow in Apache ap_pregsub via mod-setenvif",
"refsource" : "FULLDISC",
"url" : "http://archives.neohapsis.com/archives/fulldisclosure/2011-11/0023.html"
},
{
"name" : "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/",
"refsource" : "MISC",
"url" : "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/"
},
{
"name" : "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html",
"refsource" : "MISC",
"url" : "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html"
},
{
"name" : "https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/811422",
"refsource" : "CONFIRM",
"url" : "https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/811422"
},
{
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=750935",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=750935"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html"
},
{
"name" : "http://support.apple.com/kb/HT5501",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT5501"
},
{
"name" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html",
"refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html"
},
{
"name" : "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html",
"refsource" : "CONFIRM",
"url" : "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html"
},
{
"name" : "APPLE-SA-2012-09-19-2",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html"
},
{
"name" : "DSA-2405",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2012/dsa-2405"
},
{
"name" : "HPSBMU02786",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
},
{
"name" : "SSRT100877",
"refsource" : "HP",
"url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041"
},
{
"name" : "HPSBOV02822",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=134987041210674&w=2"
},
{
"name" : "SSRT100966",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=134987041210674&w=2"
},
{
"name" : "HPSBUX02761",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=133494237717847&w=2"
},
{
"name" : "SSRT100823",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=133494237717847&w=2"
},
{
"name" : "HPSBMU02748",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=133294460209056&w=2"
},
{
"name" : "SSRT100772",
"refsource" : "HP",
"url" : "http://marc.info/?l=bugtraq&m=133294460209056&w=2"
},
{
"name" : "MDVSA-2012:003",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2012:003"
},
{
"name" : "MDVSA-2013:150",
"refsource" : "MANDRIVA",
"url" : "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150"
},
{
"name" : "RHSA-2012:0128",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0128.html"
},
{
"name" : "RHSA-2012:0542",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0542.html"
},
{
"name" : "RHSA-2012:0543",
"refsource" : "REDHAT",
"url" : "http://rhn.redhat.com/errata/RHSA-2012-0543.html"
},
{
"name" : "50494",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/50494"
},
{
"name" : "76744",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/76744"
},
{
"name" : "1026267",
"refsource" : "SECTRACK",
"url" : "http://securitytracker.com/id?1026267"
},
{
"name" : "45793",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/45793"
},
{
"name" : "48551",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/48551"
},
{
"name" : "apache-http-appregsub-bo(71093)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/71093"
}
]
}
}