| VID |
22214 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
The version of the mod_mylo Apache module is older than 0.2.2. Mod_mylo is an Apache module designed to log HTTP requests to a MySQL database. Mod_mylo versions 0.2.1 and earlier are vulnerable to a buffer overflow in the logging section of the code, caused by insufficient bounds checking. A remote attacker can send an overly long HTTP request to the 'reqstr' buffer in the my_sql_real_escape_string() function to overflow the buffer and overwrite memory, and execute arbitrary commands on the system under the privileges of the Apache HTTP server, typically 'www'.
* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://www.securiteam.com/unixfocus/5XP0P2AALK.html http://www.securityfocus.com/archive/1/330677
* Platforms Affected: Apache HTTP Server Any version mod_mylo 2.1 and earlier Unix Any version Linux Any version Windows Any version |
| Recommendation |
Upgrade to the latest version of mod_mylo (0.2.2 or later), available from the Programvareverkstedet Web site at http://www.pvv.ntnu.no/~oyving/code/mod_mylo/
Disable the mod_mylo Apache module, if it is not required. |
| Related URL |
CVE-2003-0651 (CVE) |
| Related URL |
8287 (SecurityFocus) |
| Related URL |
12746 (ISS) |
|