Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2004-0700 | First vendor Publication | 2004-07-27 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Format string vulnerability in the mod_proxy hook functions function in ssl_engine_log.c in mod_ssl before 2.8.19 for Apache before 1.3.31 may allow remote attackers to execute arbitrary messages via format string specifiers in certain log messages for HTTPS that are handled by the ssl_log function. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0700 |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-09-04 | Name : FreeBSD Ports: apache+mod_ssl File : nvt/freebsd_apache+mod_ssl.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 532-1 (libapache-mod-ssl) File : nvt/deb_532_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 532-2 (libapache-mod-ssl) File : nvt/deb_532_2.nasl |
2005-11-03 | Name : mod_ssl hook functions format string vulnerability File : nvt/mod_ssl_hook_functions_format_string_vuln.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
7929 | Apache HTTP Server mod_ssl ssl_engine_log.c mod_proxy Hook Function Remote Fo... The mod_ssl ssl_log function in Apache contains a flaw that may allow an attacker to execute arbitrary messages. The issue is triggered due to a ssl_log() format string error within the 'mod_proxy' hook functions. It is possible that the flaw may allow an attacker to execute arbitrary messages via format string specifiers in certain log messages for HTTPS resulting in a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Apache mod_ssl hook functions format string attempt RuleID : 15980 - Revision : 7 - Type : SERVER-APACHE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-01-24 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2008-0523.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_18974c8a1fbd11d9814e0001020eed82.nasl - Type : ACT_GATHER_INFO |
2006-01-15 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-177-1.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-532.nasl - Type : ACT_GATHER_INFO |
2004-09-09 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2004-408.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing a security update. File : mandrake_MDKSA-2004-075.nasl - Type : ACT_GATHER_INFO |
2004-07-16 | Name : The remote web server is using a module that is affected by a remote code exe... File : mod_ssl_hook_functions_format_string_vuln.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:23:01 |
|
2024-11-28 12:06:10 |
|
2021-05-04 12:02:22 |
|
2021-04-22 01:02:31 |
|
2020-05-23 00:15:51 |
|
2017-07-11 12:01:29 |
|
2016-10-18 12:01:22 |
|
2016-06-28 15:06:05 |
|
2016-04-26 12:52:20 |
|
2014-02-17 10:27:51 |
|
2014-01-19 21:22:16 |
|
2013-05-11 11:42:25 |
|