High severity7.8NVD Advisory· Published Feb 9, 2005· Updated Apr 16, 2026
CVE-2004-0940
CVE-2004-0940
Description
Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.
Affected products
21cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:o:slackware:slackware_linux:10.0:*:*:*:*:*:*:*
- cpe:2.3:o:slackware:slackware_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:slackware:slackware_linux:8.1:*:*:*:*:*:*:*
- cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*
- cpe:2.3:o:slackware:slackware_linux:current:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*
- cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*
- cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
21- lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3EnvdMailing ListPatch
- lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3EnvdMailing ListPatch
- lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3EnvdMailing ListPatch
- lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3EnvdMailing ListPatch
- lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3EnvdMailing ListPatch
- lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3EnvdMailing ListPatch
- lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3EnvdMailing ListPatch
- www.securityfocus.com/bid/11471nvdBroken LinkExploitPatchThird Party AdvisoryVDB EntryVendor Advisory
- marc.infonvdMailing ListThird Party Advisory
- securitytracker.com/idnvdBroken LinkThird Party AdvisoryVDB Entry
- support.avaya.com/elmodocs2/security/ASA-2006-081.htmnvdThird Party Advisory
- www.debian.org/security/2004/dsa-594nvdMailing ListThird Party Advisory
- www.mandriva.com/security/advisoriesnvdThird Party Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/17785nvdThird Party AdvisoryVDB Entry
- secunia.com/advisories/12898/nvdBroken Link
- secunia.com/advisories/19073nvdBroken Link
- sunsolve.sun.com/search/document.donvdBroken Link
- www.apacheweek.com/features/security-13nvdProduct
- www.redhat.com/support/errata/RHSA-2004-600.htmlnvdBroken Link
- www.redhat.com/support/errata/RHSA-2005-816.htmlnvdBroken Link
- www.vupen.com/english/advisories/2006/0789nvdBroken Link
News mentions
0No linked articles in our index yet.