Ask the Community
Groups
CVE-2011-3607 httpd: ap_pregsub Integer overflow to buffer overflow - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="cve-id"><strong>CVE ID</strong></h3> <p>CVE-2011-3607</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p>Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.<br><br>Unitrends risk assessment: None with security updates</p> <h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p></p> <p>For CentOS6, fixed in httpd-2.2.15-15.el6_2.1 or later and<br>Unitrends systems have httpd-2.2.15-54.el6 or later which has the fix.</p> <h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul><li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2Fcve-2011-3607%250D%250Ahttps%3A%2F%2Faccess.redhat.com%2Ferrata%2FRHSA-2012%3A0128">https://access.redhat.com/security/cve/cve-2011-3607 https://access.redhat.com/errata/RHSA-2012:0128</a></li></ul> </article> </main>