Apache 1.3: Buffer overflow vulnerability in mod_include A buffer overflow vulnerability exists in mod_include which could possibly allow a local attacker to gain escalated privileges. apache 2004-11-02 2007-12-30 68564 local 1.3.32-r1 1.3.32-r1

The Apache HTTP server is one of the most popular web servers on the internet. mod_include is an Apache module to handle Server Side Includes (SSI).

A possible buffer overflow exists in the get_tag() function of mod_include.c.

If Server Side Includes (SSI) are enabled, a local attacker may be able to run arbitrary code with the rights of an httpd child process by making use of a specially-crafted document with malformed SSI.

There is no known workaround at this time.

All Apache users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/apache-1.3.32-r1"
CAN-2004-0940 Security vulnerabilities in Apache httpd 1.3 koon vorlon078 vorlon078