From eb8e1c132ffdb6e3556ad38dc126704b6300294c Mon Sep 17 00:00:00 2001 From: "Simon L. B. Nielsen" Date: Sat, 11 Dec 2004 16:22:38 +0000 Subject: [PATCH] Document a NULL pointer dereference vulnerability in mod_access_referer. Submitted by: Niels Heinen --- security/vuxml/vuln.xml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 471a79268a2a..b52256aed666 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -32,6 +32,37 @@ EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. --> + + mod_access_referer -- NULL pointer dereference vulnerability + + + mod_access_referer + 1.0.2_1 + + + + +

A malformed Referer header field causes the Apache + ap_parse_uri_components function to discard it with the + result that a pointer is not initialized. The + mod_acesses_referer module does not take this into account + with the result that it may use such a pointer.

+

The NULL pointer vulnerability may possibly be used in a + remote denial of service attack against affected Apache + servers.

+ +
+ + 7375 + http://secunia.com/product/1477/ + http://marc.theaimsgroup.com/?l=full-disclosure&m=105053485515811 + + + 2003-04-16 + 2004-12-11 + +
+ squid -- possible information disclosure