CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-2006-3747

Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.
Publish Date : 2006-07-28 Last Update Date : 2011-09-06
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
7.6
Confidentiality Impact Complete (There is total information disclosure, resulting in all system files being revealed.)
Integrity Impact Complete (There is a total compromise of system integrity. There is a complete loss of system protection, resulting in the entire system being compromised.)
Availability Impact Complete (There is a total shutdown of the affected resource. The attacker can render the resource completely unavailable.)
Access Complexity High (Specialized access conditions exist. It is hard to exploit and several special conditions must be satisfied to exploit)
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access Admin
Vulnerability Type(s) Denial Of ServiceExecute Code
CWE ID 189

- Vendor Statements

Fixed in Apache HTTP Server 2.2.3, 2.0.59, and 1.3.37: http://httpd.apache.org/security/vulnerabilities_22.html http://httpd.apache.org/security/vulnerabilities_20.html http://httpd.apache.org/security/vulnerabilities_13.html
Source: Apache
The ability to exploit this issue is dependent on the stack layout for a particular compiled version of mod_rewrite. If the compiler has added padding to the stack immediately after the buffer being overwritten, this issue can not be exploited, and Apache httpd will continue operating normally. The Red Hat Security Response Team analyzed Red Hat Enterprise Linux 3 and Red Hat Enterprise Linux 4 binaries for all architectures as shipped by Red Hat and determined that these versions cannot be exploited. This issue does not affect the version of Apache httpd as supplied with Red Hat Enterprise Linux 2.1
Source: Redhat

- Related OVAL Definitions

Title Definition Id Class Family
CVE-2006-3747 oval:org.opensuse.security:def:20063747 unix
mod_rewrite off-by-one error oval:org.apache.httpd:def:20063747
OVAL (Open Vulnerability and Assessment Language) definitions define exactly what should be done to verify a vulnerability or a missing patch. Check out the OVAL definitions if you want to learn what you should do to verify a vulnerability.

- Products Affected By CVE-2006-3747

# Product Type Vendor Product Version Update Edition Language
1 Application Apache Http Server 1.3.3 Version Details Vulnerabilities
2 Application Apache Http Server 1.3.4 Version Details Vulnerabilities
3 Application Apache Http Server 1.3.5 Version Details Vulnerabilities
4 Application Apache Http Server 1.3.6 Version Details Vulnerabilities
5 Application Apache Http Server 1.3.7 DEV Version Details Vulnerabilities
6 Application Apache Http Server 1.3.7 Version Details Vulnerabilities
7 Application Apache Http Server 1.3.8 Version Details Vulnerabilities
8 Application Apache Http Server 1.3.9 Version Details Vulnerabilities
9 Application Apache Http Server 1.3.28 Version Details Vulnerabilities
10 Application Apache Http Server 1.3.29 Version Details Vulnerabilities
11 Application Apache Http Server 1.3.30 Version Details Vulnerabilities
12 Application Apache Http Server 1.3.31 Version Details Vulnerabilities
13 Application Apache Http Server 1.3.32 Version Details Vulnerabilities
14 Application Apache Http Server 1.3.33 Version Details Vulnerabilities
15 Application Apache Http Server 2.0.46 Version Details Vulnerabilities
16 Application Apache Http Server 2.0.47 Version Details Vulnerabilities
17 Application Apache Http Server 2.0.48 Version Details Vulnerabilities
18 Application Apache Http Server 2.0.49 Version Details Vulnerabilities
19 Application Apache Http Server 2.0.50 Version Details Vulnerabilities
20 Application Apache Http Server 2.0.51 Version Details Vulnerabilities
21 Application Apache Http Server 2.0.52 Version Details Vulnerabilities
22 Application Apache Http Server 2.0.53 Version Details Vulnerabilities
23 Application Apache Http Server 2.0.54 Version Details Vulnerabilities
24 Application Apache Http Server 2.0.55 Version Details Vulnerabilities
25 Application Apache Http Server 2.0.56 Version Details Vulnerabilities
26 Application Apache Http Server 2.0.57 Version Details Vulnerabilities
27 Application Apache Http Server 2.0.58 Version Details Vulnerabilities
28 OS Ubuntu Ubuntu Linux 5.04 Version Details Vulnerabilities
29 OS Ubuntu Ubuntu Linux 5.10 Version Details Vulnerabilities
30 OS Ubuntu Ubuntu Linux 6.06 Lts Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
Apache Http Server 27
Ubuntu Ubuntu Linux 3

- References For CVE-2006-3747

http://docs.info.apple.com/article.html?artnum=307562 CONFIRM
http://secunia.com/advisories/29420
SECUNIA 29420
http://secunia.com/advisories/26329
SECUNIA 26329
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
APPLE APPLE-SA-2008-03-18
http://lists.apple.com/archives/security-announce/2008//May/msg00001.html
APPLE APPLE-SA-2008-05-28
http://www.mandriva.com/security/advisories?name=MDKSA-2006:133
MANDRIVA MDKSA-2006:133
http://securityreason.com/securityalert/1312
SREASON 1312
http://secunia.com/advisories/30430
SECUNIA 30430
http://secunia.com/advisories/29849
SECUNIA 29849
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01118771
HP HPSBMA02250
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01428449
HP HPSBMA02328
http://kbase.redhat.com/faq/FAQ_68_8653.shtm
http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/048267.html
FULLDISC 20060728 Apache 1.3.29/2.X mod_rewrite Buffer Overflow Vulnerability CVE-2006-3747
http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/048271.html
FULLDISC 20060728 [Announcement] Apache HTTP Server 2.2.3 (2.0.59, 1.3.37) Released
http://marc.info/?l=bugtraq&m=130497311408250&w=2
HP HPSBOV02683
http://lwn.net/Alerts/194228/
TRUSTIX 2006-0044
http://secunia.com/advisories/21197
SECUNIA 21197
http://secunia.com/advisories/21245
SECUNIA 21245
http://secunia.com/advisories/21241
SECUNIA 21241
http://secunia.com/advisories/21307
SECUNIA 21307
http://secunia.com/advisories/21247
SECUNIA 21247
http://secunia.com/advisories/21266
SECUNIA 21266
http://secunia.com/advisories/21273
SECUNIA 21273
http://secunia.com/advisories/21284
SECUNIA 21284
http://secunia.com/advisories/21313
SECUNIA 21313
http://secunia.com/advisories/21315
SECUNIA 21315
http://secunia.com/advisories/21346
SECUNIA 21346
http://secunia.com/advisories/21478
SECUNIA 21478
http://secunia.com/advisories/21509
SECUNIA 21509
http://secunia.com/advisories/22262
SECUNIA 22262
http://secunia.com/advisories/22368
SECUNIA 22368
http://secunia.com/advisories/22388
SECUNIA 22388
http://secunia.com/advisories/22523
SECUNIA 22523
http://secunia.com/advisories/23260
SECUNIA 23260
http://security.gentoo.org/glsa/glsa-200608-01.xml
GENTOO GLSA-200608-01
http://secunia.com/advisories/23028
SECUNIA 23028
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102662-1
SUNALERT 102662
http://securitytracker.com/id?1016601
SECTRACK 1016601
http://www-1.ibm.com/support/docview.wss?uid=swg24013080
AIXAPAR PK27875
http://www-1.ibm.com/support/docview.wss?uid=swg1PK29156
AIXAPAR PK29156
http://www-1.ibm.com/support/docview.wss?uid=swg1PK29154
AIXAPAR PK29154
http://www-1.ibm.com/support/docview.wss?uid=swg27007951 CONFIRM
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102663-1
SUNALERT 102663
http://svn.apache.org/viewvc?view=rev&revision=426144
http://www.vupen.com/english/advisories/2006/3017
VUPEN ADV-2006-3017
http://www.ubuntu.com/usn/usn-328-1
UBUNTU USN-328-1
http://www.securityfocus.com/bid/19204
BID 19204 Apache Mod_Rewrite Off-By-One Buffer Overflow Vulnerability Release Date:2009-03-10
http://www.securityfocus.com/archive/1/archive/1/450321/100/0/threaded
HP SSRT061265
http://www.securityfocus.com/archive/1/archive/1/445206/100/0/threaded
HP HPSBUX02145
http://www.securityfocus.com/archive/1/archive/1/443870/100/0/threaded
BUGTRAQ 20060820 POC & exploit for Apache mod_rewrite off-by-one
http://www.securityfocus.com/archive/1/archive/1/441526/100/200/threaded
BUGTRAQ 20060728 rPSA-2006-0139-1 httpd mod_ssl
http://www.securityfocus.com/archive/1/archive/1/441487/100/0/threaded
BUGTRAQ 20060728 Apache mod_rewrite Buffer Overflow Vulnerability
http://www.securityfocus.com/archive/1/archive/1/441485/100/0/threaded
BUGTRAQ 20060728 [Announcement] Apache HTTP Server 2.2.3 (2.0.59, 1.3.37) Released
http://www.osvdb.org/27588
OSVDB 27588
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.015-apache.html
OPENPKG OpenPKG-SA-2006.015
http://www.novell.com/linux/security/advisories/2006_43_apache.html
SUSE SUSE-SA:2006:043
http://www.vupen.com/english/advisories/2006/3995
VUPEN ADV-2006-3995
http://www.vupen.com/english/advisories/2006/3264
VUPEN ADV-2006-3264
http://www.vupen.com/english/advisories/2006/3282
VUPEN ADV-2006-3282
http://www.vupen.com/english/advisories/2006/3884
VUPEN ADV-2006-3884
http://www.vupen.com/english/advisories/2006/4015
VUPEN ADV-2006-4015
http://www.vupen.com/english/advisories/2006/4207
VUPEN ADV-2006-4207
http://www.vupen.com/english/advisories/2006/4300
VUPEN ADV-2006-4300
http://www.vupen.com/english/advisories/2008/0924/references
VUPEN ADV-2008-0924
http://www.vupen.com/english/advisories/2007/2783
VUPEN ADV-2007-2783
http://www.kb.cert.org/vuls/id/395412
CERT-VN VU#395412
http://www.us-cert.gov/cas/techalerts/TA08-150A.html
CERT TA08-150A
http://www.debian.org/security/2006/dsa-1132
DEBIAN DSA-1132
http://www.debian.org/security/2006/dsa-1131
DEBIAN DSA-1131
http://www.apache.org/dist/httpd/Announcement2.0.html CONFIRM
https://issues.rpath.com/browse/RPL-538 CONFIRM
http://xforce.iss.net/xforce/xfdb/28063
XF apache-modrewrite-offbyone-bo(28063)
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117 CONFIRM
http://www.vupen.com/english/advisories/2006/4868
VUPEN ADV-2006-4868
http://www.vupen.com/english/advisories/2008/1246/references
VUPEN ADV-2008-1246
http://www.vupen.com/english/advisories/2008/1697
VUPEN ADV-2008-1697

- Metasploit Modules Related To CVE-2006-3747

There are not any metasploit modules related to this vulnerability (Please visit www.metasploit.com for more information)


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.