Vulnerabilities > CVE-2004-2680 - Unspecified vulnerability in Apache MOD Python
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN apache
nessus
Summary
mod_python (libapache2-mod-python) 3.1.4 and earlier does not properly handle when output filters process more than 16384 bytes, which can cause filter.read to return portions of previously freed memory.
Vulnerable Configurations
Nessus
NASL family SuSE Local Security Checks NASL id SUSE_APACHE2-MOD_PYTHON-4448.NASL description This update fixes a buffer overflow in apache2-mod_python that occurs while using python-based output-filter. This bug can be triggered remotely to read possibly confidential data from the process space of the web-server and in rare cases to execute arbitrary code. (CVE-2004-2680) last seen 2020-06-01 modified 2020-06-02 plugin id 29879 published 2008-01-08 reporter This script is Copyright (C) 2008-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/29879 title openSUSE 10 Security Update : apache2-mod_python (apache2-mod_python-4448) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-430-1.NASL description Miles Egan discovered that mod_python, when used in output filter mode, did not handle output larger than 16384 bytes, and would display freed memory, possibly disclosing private data. Thanks to Jim Garrison of the Software Freedom Law Center for identifying the original bug as a security vulnerability. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 28024 published 2007-11-10 reporter Ubuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/28024 title Ubuntu 5.10 / 6.06 LTS : libapache2-mod-python vulnerability (USN-430-1) NASL family SuSE Local Security Checks NASL id SUSE9_11804.NASL description This update fixes a buffer overflow in apache2-mod_python that occurs while using python-based output-filter. This bug can be triggered remotely to read possibly confidential data from the process space of the web-server and in rare cases to execute arbitrary code. (CVE-2004-2680) last seen 2020-06-01 modified 2020-06-02 plugin id 41153 published 2009-09-24 reporter This script is Copyright (C) 2009-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/41153 title SuSE9 Security Update : apache2-mod_python (YOU Patch Number 11804) NASL family SuSE Local Security Checks NASL id SUSE_APACHE2-MOD_PYTHON-4449.NASL description This update fixes a buffer overflow in apache2-mod_python that occurs while using python-based output-filter. This bug can be triggered remotely to read possibly confidential data from the process space of the web-server and in rare cases to execute arbitrary code. (CVE-2004-2680) last seen 2020-06-01 modified 2020-06-02 plugin id 29380 published 2007-12-13 reporter This script is Copyright (C) 2007-2019 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/29380 title SuSE 10 Security Update : apache2-mod_python (ZYPP Patch Number 4449)
Statements
contributor | Tomas Hoger |
lastmodified | 2009-05-21 |
organization | Red Hat |
statement | Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2004-2680 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ |
References
- http://mail-archives.apache.org/mod_mbox/httpd-python-dev/200404.mbox/%3c6DCA8C14-8FFA-11D8-8B4E-000A95B0D772%40pixar.com%3e
- http://mail-archives.apache.org/mod_mbox/httpd-python-dev/200404.mbox/%3c6DCA8C14-8FFA-11D8-8B4E-000A95B0D772%40pixar.com%3e
- http://mail-archives.apache.org/mod_mbox/httpd-python-dev/200404.mbox/%3cCD485B27-8F3E-11D8-934B-000A95B0D772%40pixar.com%3e
- http://mail-archives.apache.org/mod_mbox/httpd-python-dev/200404.mbox/%3cCD485B27-8F3E-11D8-934B-000A95B0D772%40pixar.com%3e
- http://mail-archives.apache.org/mod_mbox/httpd-python-dev/200404.mbox/%3cEB279100-9000-11D8-8B4E-000A95B0D772%40pixar.com%3e
- http://mail-archives.apache.org/mod_mbox/httpd-python-dev/200404.mbox/%3cEB279100-9000-11D8-8B4E-000A95B0D772%40pixar.com%3e
- http://secunia.com/advisories/24418
- http://secunia.com/advisories/24418
- http://secunia.com/advisories/24424
- http://secunia.com/advisories/24424
- http://svn.apache.org/viewvc/httpd/mod_python/trunk/src/filterobject.c?r1=102649&r2=103561&pathrev=103561
- http://svn.apache.org/viewvc/httpd/mod_python/trunk/src/filterobject.c?r1=102649&r2=103561&pathrev=103561
- http://www.securityfocus.com/archive/1/462185/100/0/threaded
- http://www.securityfocus.com/archive/1/462185/100/0/threaded
- http://www.securityfocus.com/bid/22849
- http://www.securityfocus.com/bid/22849
- http://www.ubuntu.com/usn/usn-430-1
- http://www.ubuntu.com/usn/usn-430-1
- http://www.vupen.com/english/advisories/2007/0846
- http://www.vupen.com/english/advisories/2007/0846
- https://exchange.xforce.ibmcloud.com/vulnerabilities/14751
- https://exchange.xforce.ibmcloud.com/vulnerabilities/14751
- https://issues.rpath.com/browse/RPL-1105
- https://issues.rpath.com/browse/RPL-1105
- https://launchpad.net/bugs/89308
- https://launchpad.net/bugs/89308