// For flags

CVE-2003-0542

 

Severity Score

7.2
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple stack-based buffer overflows in (1) mod_alias and (2) mod_rewrite for Apache before 1.3.29 allow attackers to create configuration files to cause a denial of service (crash) or execute arbitrary code via a regular expression with more than 9 captures.

Múltiples desbordamientos de búfer en mod_alias y mod_rewrite de Apache anteriores a 1.3.29, con consecuencias y métodos de ataque desconocidos, relacionados con una expresión regular con más de 9 capturas.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2003-07-14 CVE Reserved
  • 2003-10-30 CVE Published
  • 2023-05-07 EPSS Updated
  • 2024-08-08 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (55)
URL Tag Source
http://docs.info.apple.com/article.html?artnum=61798 X_refsource_confirm
http://httpd.apache.org/dist/httpd/Announcement2.html X_refsource_confirm
http://lists.apple.com/mhonarc/security-announce/msg00045.html X_refsource_confirm
http://marc.info/?l=bugtraq&m=106761802305141&w=2 Mailing List
http://secunia.com/advisories/10096 Third Party Advisory
http://secunia.com/advisories/10098 Third Party Advisory
http://secunia.com/advisories/10102 Third Party Advisory
http://secunia.com/advisories/10112 Third Party Advisory
http://secunia.com/advisories/10114 Third Party Advisory
http://secunia.com/advisories/10153 Third Party Advisory
http://secunia.com/advisories/10260 Third Party Advisory
http://secunia.com/advisories/10264 Third Party Advisory
http://secunia.com/advisories/10463 Third Party Advisory
http://secunia.com/advisories/10580 Third Party Advisory
http://secunia.com/advisories/10593 Third Party Advisory
http://www.kb.cert.org/vuls/id/434566 Third Party Advisory
http://www.kb.cert.org/vuls/id/549142 Third Party Advisory
http://www.securityfocus.com/archive/1/342674 Mailing List
http://www.securityfocus.com/bid/9504 Vdb Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/13400 Vdb Entry
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E Mailing List
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E Mailing List
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3799 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A863 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A864 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9458 Signature
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
1.3
Search vendor "Apache" for product "Http Server" and version "1.3"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
1.3.1
Search vendor "Apache" for product "Http Server" and version "1.3.1"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
1.3.3
Search vendor "Apache" for product "Http Server" and version "1.3.3"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
1.3.4
Search vendor "Apache" for product "Http Server" and version "1.3.4"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
1.3.6
Search vendor "Apache" for product "Http Server" and version "1.3.6"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
1.3.9
Search vendor "Apache" for product "Http Server" and version "1.3.9"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
1.3.11
Search vendor "Apache" for product "Http Server" and version "1.3.11"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
1.3.12
Search vendor "Apache" for product "Http Server" and version "1.3.12"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
1.3.14
Search vendor "Apache" for product "Http Server" and version "1.3.14"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
1.3.17
Search vendor "Apache" for product "Http Server" and version "1.3.17"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
1.3.18
Search vendor "Apache" for product "Http Server" and version "1.3.18"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
1.3.19
Search vendor "Apache" for product "Http Server" and version "1.3.19"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
1.3.20
Search vendor "Apache" for product "Http Server" and version "1.3.20"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
1.3.22
Search vendor "Apache" for product "Http Server" and version "1.3.22"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
1.3.23
Search vendor "Apache" for product "Http Server" and version "1.3.23"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
1.3.24
Search vendor "Apache" for product "Http Server" and version "1.3.24"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
1.3.25
Search vendor "Apache" for product "Http Server" and version "1.3.25"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
1.3.26
Search vendor "Apache" for product "Http Server" and version "1.3.26"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
1.3.27
Search vendor "Apache" for product "Http Server" and version "1.3.27"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
1.3.28
Search vendor "Apache" for product "Http Server" and version "1.3.28"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
2.0
Search vendor "Apache" for product "Http Server" and version "2.0"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
2.0.28
Search vendor "Apache" for product "Http Server" and version "2.0.28"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
2.0.32
Search vendor "Apache" for product "Http Server" and version "2.0.32"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
2.0.35
Search vendor "Apache" for product "Http Server" and version "2.0.35"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
2.0.36
Search vendor "Apache" for product "Http Server" and version "2.0.36"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
2.0.37
Search vendor "Apache" for product "Http Server" and version "2.0.37"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
2.0.38
Search vendor "Apache" for product "Http Server" and version "2.0.38"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
2.0.39
Search vendor "Apache" for product "Http Server" and version "2.0.39"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
2.0.40
Search vendor "Apache" for product "Http Server" and version "2.0.40"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
2.0.41
Search vendor "Apache" for product "Http Server" and version "2.0.41"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
2.0.42
Search vendor "Apache" for product "Http Server" and version "2.0.42"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
2.0.43
Search vendor "Apache" for product "Http Server" and version "2.0.43"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
2.0.44
Search vendor "Apache" for product "Http Server" and version "2.0.44"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
2.0.45
Search vendor "Apache" for product "Http Server" and version "2.0.45"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
2.0.46
Search vendor "Apache" for product "Http Server" and version "2.0.46"
-
Affected
Apache
Search vendor "Apache"
Http Server
Search vendor "Apache" for product "Http Server"
2.0.47
Search vendor "Apache" for product "Http Server" and version "2.0.47"
-
Affected