CVE-2004-0700

Current Description

Format string vulnerability in the mod_proxy hook functions function in ssl_engine_log.c in mod_ssl before 2.8.19 for Apache before 1.3.31 may allow remote attackers to execute arbitrary messages via format string specifiers in certain log messages for HTTPS that are handled by the ssl_log function.

Basic Data

PublishedJuly 27, 2004
Last ModifiedJuly 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score7.5
SeverityHIGH
Exploitability Score10.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegetrue

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationMod SslMod Ssl2.3.11*******
    2.3ApplicationMod SslMod Ssl2.4.0*******
    2.3ApplicationMod SslMod Ssl2.4.1*******
    2.3ApplicationMod SslMod Ssl2.4.2*******
    2.3ApplicationMod SslMod Ssl2.4.3*******
    2.3ApplicationMod SslMod Ssl2.4.4*******
    2.3ApplicationMod SslMod Ssl2.4.5*******
    2.3ApplicationMod SslMod Ssl2.4.6*******
    2.3ApplicationMod SslMod Ssl2.4.7*******
    2.3ApplicationMod SslMod Ssl2.4.8*******
    2.3ApplicationMod SslMod Ssl2.4.9*******
    2.3ApplicationMod SslMod Ssl2.4.10*******
    2.3ApplicationMod SslMod Ssl2.5.0*******
    2.3ApplicationMod SslMod Ssl2.5.1*******
    2.3ApplicationMod SslMod Ssl2.6.0*******
    2.3ApplicationMod SslMod Ssl2.6.1*******
    2.3ApplicationMod SslMod Ssl2.6.2*******
    2.3ApplicationMod SslMod Ssl2.6.3*******
    2.3ApplicationMod SslMod Ssl2.6.4*******
    2.3ApplicationMod SslMod Ssl2.6.5*******
    2.3ApplicationMod SslMod Ssl2.6.6*******
    2.3ApplicationMod SslMod Ssl2.7.0*******
    2.3ApplicationMod SslMod Ssl2.7.1*******
    2.3ApplicationMod SslMod Ssl2.8.0*******
    2.3ApplicationMod SslMod Ssl2.8.1*******
    2.3ApplicationMod SslMod Ssl2.8.1.2*******
    2.3ApplicationMod SslMod Ssl2.8.2*******
    2.3ApplicationMod SslMod Ssl2.8.3*******
    2.3ApplicationMod SslMod Ssl2.8.4*******
    2.3ApplicationMod SslMod Ssl2.8.5*******
    2.3ApplicationMod SslMod Ssl2.8.5.1*******
    2.3ApplicationMod SslMod Ssl2.8.5.2*******
    2.3ApplicationMod SslMod Ssl2.8.6*******
    2.3ApplicationMod SslMod Ssl2.8.7*******
    2.3ApplicationMod SslMod Ssl2.8.8*******
    2.3ApplicationMod SslMod Ssl2.8.9*******
    2.3ApplicationMod SslMod Ssl2.8.10*******
    2.3ApplicationMod SslMod Ssl2.8.12*******
    2.3ApplicationMod SslMod Ssl2.8.14*******
    2.3ApplicationMod SslMod Ssl2.8.15*******
    2.3ApplicationMod SslMod Ssl2.8.16*******
    2.3ApplicationMod SslMod Ssl2.8.17*******
    2.3ApplicationMod SslMod Ssl2.8.18*******
  • OR - Configuration 2
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSGentooLinux1.4*******

Vulnerable Software List

VendorProductVersions
Mod Ssl Mod Ssl 2.3.11, 2.4.0, 2.4.1, 2.4.10, 2.4.2, 2.4.3, 2.4.4, 2.4.5, 2.4.6, 2.4.7, 2.4.8, 2.4.9, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 2.7.0, 2.7.1, 2.8.0, 2.8.1, 2.8.1.2, 2.8.10, 2.8.12, 2.8.14, 2.8.15, 2.8.16, 2.8.17, 2.8.18, 2.8.2, 2.8.3, 2.8.4, 2.8.5, 2.8.5.1, 2.8.5.2, 2.8.6, 2.8.7, 2.8.8, 2.8.9
Gentoo Linux 1.4

References

NameSourceURLTags
CLA-2004:857http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000857CONECTIVA
[apache-modssl] 20040716 [ANNOUNCE] mod_ssl 2.8.19 for Apache 1.3.31http://marc.info/?l=apache-modssl&m=109001100906749&w=2MLIST
20040716 [OpenPKG-SA-2004.032] OpenPKG Security Advisory (apache)http://marc.info/?l=bugtraq&m=109005001205991&w=2BUGTRAQ
http://packetstormsecurity.org/0407-advisories/modsslFormat.txthttp://packetstormsecurity.org/0407-advisories/modsslFormat.txtMISC
http://virulent.siyahsapka.org/http://virulent.siyahsapka.org/MISC
DSA-532http://www.debian.org/security/2004/dsa-532DEBIAN
VU#303448http://www.kb.cert.org/vuls/id/303448CERT-VNThird Party Advisory US Government Resource
MDKSA-2004:075http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:075MANDRAKE
7929http://www.osvdb.org/7929OSVDB
RHSA-2004:405http://www.redhat.com/support/errata/RHSA-2004-405.htmlREDHAT
RHSA-2004:408http://www.redhat.com/support/errata/RHSA-2004-408.htmlREDHAT
10736http://www.securityfocus.com/bid/10736BID
USN-177-1http://www.ubuntu.com/usn/usn-177-1UBUNTU
FLSA:1888https://bugzilla.fedora.us/show_bug.cgi?id=1888FEDORA
apache-modssl-format-string(16705)https://exchange.xforce.ibmcloud.com/vulnerabilities/16705XF