Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2013-1862 | First vendor Publication | 2013-06-10 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:H/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 5.1 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | High |
Cvss Expoit Score | 4.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1862 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18790 | |||
Oval ID: | oval:org.mitre.oval:def:18790 | ||
Title: | Apache HTTP vulnerability from 2.2.x before 2.2.25 in VisualSVN Server (CVE-2013-1862) | ||
Description: | mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2013-1862 | Version: | 5 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Server 2012 | Product(s): | VisualSVN Server |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:21067 | |||
Oval ID: | oval:org.mitre.oval:def:21067 | ||
Title: | RHSA-2013:0815: httpd security update (Moderate) | ||
Description: | mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2013:0815-01 CESA-2013:0815 CVE-2012-3499 CVE-2012-4558 CVE-2013-1862 | Version: | 45 |
Platform(s): | Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 5 CentOS Linux 5 CentOS Linux 6 | Product(s): | httpd |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:23465 | |||
Oval ID: | oval:org.mitre.oval:def:23465 | ||
Title: | DEPRECATED: ELSA-2013:0815: httpd security update (Moderate) | ||
Description: | mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:0815-01 CVE-2012-3499 CVE-2012-4558 CVE-2013-1862 | Version: | 18 |
Platform(s): | Oracle Linux 6 Oracle Linux 5 | Product(s): | httpd |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:24116 | |||
Oval ID: | oval:org.mitre.oval:def:24116 | ||
Title: | ELSA-2013:0815: httpd security update (Moderate) | ||
Description: | mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2013:0815-01 CVE-2012-3499 CVE-2012-4558 CVE-2013-1862 | Version: | 17 |
Platform(s): | Oracle Linux 6 Oracle Linux 5 | Product(s): | httpd |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25300 | |||
Oval ID: | oval:org.mitre.oval:def:25300 | ||
Title: | SUSE-SU-2013:1824-1 -- Security update for Apache2 | ||
Description: | Apache2 received an LTSS rollup update which fixes various security issues and bugs. | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2013:1824-1 CVE-2013-1896 CVE-2013-1862 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 | Product(s): | Apache2 |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:25551 | |||
Oval ID: | oval:org.mitre.oval:def:25551 | ||
Title: | SUSE-SU-2013:1381-1 -- Security update for Apache2 | ||
Description: | This collective update for Apache provides the following fixes: * Make sure that input that has already arrived on the socket is not discarded during a non-blocking read (read(2) returns 0 and errno is set to -EAGAIN). (bnc#815621) * Close the connection just before an attempted re-negotiation if data has been read with pipelining. This is done by resetting the keepalive status. (bnc#815621) * Reset the renegotiation status of a client<->server connection to RENEG_INIT to prevent falsely assumed status. (bnc#791794) * "OPTIONS *" internal requests are intercepted by a dummy filter that kicks in for the OPTIONS method. Apple iPrint uses "OPTIONS *" to upgrade the connection to TLS/1.0 following RFC 2817. For compatibility, check if an Upgrade request header is present and skip the filter if yes. (bnc#791794) * Sending a MERGE request against a URI handled by mod_dav_svn with the source href (sent as part of the request body as XML) pointing to a URI that is not configured for DAV will trigger a segfault. (bnc#829056, CVE-2013-1896) * Client data written to the RewriteLog must have terminal escape sequences escaped. (bnc#829057, CVE-2013-1862) | ||
Family: | unix | Class: | patch |
Reference(s): | SUSE-SU-2013:1381-1 CVE-2013-1896 CVE-2013-1862 | Version: | 3 |
Platform(s): | SUSE Linux Enterprise Server 11 | Product(s): | Apache2 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-07-16 | IAVM : 2015-A-0149 - Multiple Vulnerabilities in Juniper Networks and Security Manager(NSM) Appliance Severity : Category I - VMSKEY : V0061101 |
2014-02-27 | IAVM : 2014-A-0030 - Apple Mac OS X Security Update 2014-001 Severity : Category I - VMSKEY : V0044547 |
2014-01-16 | IAVM : 2014-A-0009 - Multiple Vulnerabilities in Oracle Fusion Middleware Severity : Category I - VMSKEY : V0043395 |
2013-09-12 | IAVM : 2013-A-0177 - Multiple Vulnerabilities in Red Hat JBoss Enterprise Application Platform Severity : Category I - VMSKEY : V0040288 |
2013-07-25 | IAVM : 2013-A-0146 - Multiple Security Vulnerabilities in Apache HTTP Server Severity : Category I - VMSKEY : V0039573 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-07-20 | Name : The remote host is affected by multiple vulnerabilities. File : juniper_nsm_jsa10685_cred.nasl - Type : ACT_GATHER_INFO |
2015-07-20 | Name : The remote host is affected by multiple vulnerabilities. File : juniper_nsm_jsa10685.nasl - Type : ACT_GATHER_INFO |
2015-05-20 | Name : The remote SUSE host is missing one or more security updates. File : suse_SU-2014-1082-1.nasl - Type : ACT_GATHER_INFO |
2015-01-19 | Name : The remote Solaris system is missing a security patch for third-party software. File : solaris11_apache_20131015.nasl - Type : ACT_GATHER_INFO |
2014-12-22 | Name : The remote device is affected by multiple vulnerabilities. File : juniper_space_jsa10627.nasl - Type : ACT_GATHER_INFO |
2014-12-16 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2014-770.nasl - Type : ACT_GATHER_INFO |
2014-11-28 | Name : The remote device is missing a vendor-supplied security patch. File : f5_bigip_SOL15877.nasl - Type : ACT_GATHER_INFO |
2014-06-26 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1133.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-638.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2013-637.nasl - Type : ACT_GATHER_INFO |
2014-02-25 | Name : The remote host is missing a Mac OS X update that fixes multiple security vul... File : macosx_SecUpd2014-001.nasl - Type : ACT_GATHER_INFO |
2014-02-25 | Name : The remote host is missing a Mac OS X update that fixes a certificate validat... File : macosx_10_9_2.nasl - Type : ACT_GATHER_INFO |
2014-01-31 | Name : The remote Red Hat host is missing a security update. File : redhat-RHSA-2013-1209.nasl - Type : ACT_GATHER_INFO |
2014-01-20 | Name : The remote application server is potentially affected by multiple vulnerabili... File : websphere_7_0_0_31.nasl - Type : ACT_GATHER_INFO |
2013-12-05 | Name : The remote application server may be affected by multiple vulnerabilities. File : websphere_8_5_5_1.nasl - Type : ACT_GATHER_INFO |
2013-09-24 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201309-12.nasl - Type : ACT_GATHER_INFO |
2013-09-20 | Name : The remote application server may be affected by multiple vulnerabilities. File : websphere_6_1_0_47.nasl - Type : ACT_GATHER_INFO |
2013-09-13 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1208.nasl - Type : ACT_GATHER_INFO |
2013-09-13 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-1207.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-193.nasl - Type : ACT_GATHER_INFO |
2013-09-04 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2013-194.nasl - Type : ACT_GATHER_INFO |
2013-08-27 | Name : The remote SuSE 11 host is missing one or more security updates. File : suse_11_apache2-130730.nasl - Type : ACT_GATHER_INFO |
2013-08-23 | Name : The remote application server may be affected by multiple vulnerabilities. File : websphere_8_0_0_7.nasl - Type : ACT_GATHER_INFO |
2013-07-16 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-1903-1.nasl - Type : ACT_GATHER_INFO |
2013-07-16 | Name : The remote web server may be affected by multiple cross-site scripting vulner... File : apache_2_2_25.nasl - Type : ACT_GATHER_INFO |
2013-07-16 | Name : The remote web server is affected by several vulnerabilities. File : apache_2_0_65.nasl - Type : ACT_GATHER_INFO |
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2013-0815.nasl - Type : ACT_GATHER_INFO |
2013-07-06 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_f3d24aeee5ad11e2b18320cf30e32f6d.nasl - Type : ACT_GATHER_INFO |
2013-06-16 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-174.nasl - Type : ACT_GATHER_INFO |
2013-05-15 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20130513_httpd_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2013-05-14 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2013-0815.nasl - Type : ACT_GATHER_INFO |
2013-05-14 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2013-0815.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 12:34:24 |
|
2024-08-02 12:23:21 |
|
2024-08-02 01:06:55 |
|
2024-02-02 01:22:41 |
|
2024-02-01 12:06:42 |
|
2023-11-07 21:46:05 |
|
2023-09-05 12:21:26 |
|
2023-09-05 01:06:36 |
|
2023-09-02 12:21:27 |
|
2023-09-02 01:06:42 |
|
2023-08-22 12:19:10 |
|
2023-03-28 12:06:44 |
|
2022-10-11 01:06:24 |
|
2022-09-15 00:27:40 |
|
2021-06-06 17:23:01 |
|
2021-06-03 13:23:12 |
|
2021-05-04 12:26:52 |
|
2021-04-22 01:32:34 |
|
2021-03-30 17:22:48 |
|
2020-05-23 00:36:44 |
|
2019-08-16 12:01:52 |
|
2017-09-19 09:25:57 |
|
2017-01-07 09:25:12 |
|
2016-12-08 09:23:27 |
|
2016-04-26 23:02:15 |
|
2015-10-18 17:22:18 |
|
2015-07-24 13:29:03 |
|
2015-05-21 13:30:19 |
|
2015-01-21 13:26:06 |
|
2014-12-23 13:26:18 |
|
2014-12-17 13:25:17 |
|
2014-11-29 13:27:08 |
|
2014-06-27 13:26:12 |
|
2014-06-14 13:35:09 |
|
2014-03-06 13:22:11 |
|
2014-02-28 17:19:11 |
|
2014-02-26 13:21:13 |
|
2014-02-17 11:18:32 |
|
2014-01-28 13:19:35 |
|
2014-01-18 00:18:32 |
|
2014-01-17 13:19:32 |
|
2013-12-05 17:19:56 |
|
2013-11-11 12:40:21 |
|
2013-11-04 21:26:41 |
|
2013-10-11 13:26:02 |
|
2013-10-01 17:19:35 |
|
2013-09-26 21:22:40 |
|
2013-08-30 17:22:41 |
|
2013-08-23 13:19:12 |
|
2013-08-22 17:19:54 |
|
2013-06-21 13:19:37 |
|
2013-06-11 17:26:28 |
|
2013-06-10 21:19:23 |
|