Korean
<< Back
VID 22214
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The version of the mod_mylo Apache module is older than 0.2.2.
Mod_mylo is an Apache module designed to log HTTP requests to a MySQL database. Mod_mylo versions 0.2.1 and earlier are vulnerable to a buffer overflow in the logging section of the code, caused by insufficient bounds checking. A remote attacker can send an overly long HTTP request to the 'reqstr' buffer in the my_sql_real_escape_string() function to overflow the buffer and overwrite memory, and execute arbitrary commands on the system under the privileges of the Apache HTTP server, typically 'www'.

* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://www.securiteam.com/unixfocus/5XP0P2AALK.html
http://www.securityfocus.com/archive/1/330677

* Platforms Affected:
Apache HTTP Server Any version
mod_mylo 2.1 and earlier
Unix Any version
Linux Any version
Windows Any version
Recommendation Upgrade to the latest version of mod_mylo (0.2.2 or later), available from the Programvareverkstedet Web site at http://www.pvv.ntnu.no/~oyving/code/mod_mylo/

Disable the mod_mylo Apache module, if it is not required.
Related URL CVE-2003-0651 (CVE)
Related URL 8287 (SecurityFocus)
Related URL 12746 (ISS)