vendor:
Apache
by:
axis
7.5
CVSS
HIGH
off-by-one overflow
CWE
Product Name: Apache
Affected Version From: 1.3.28, 2.0.46, 2.2.0
Affected Version To: 1.3.37, 2.0.59, 2.2.3
Patch Exists: NO
Related CWE: CVE-2006-3747
CPE:
Metasploit:
https://www.rapid7.com/db/vulnerabilities/apache-httpd-2_2_x-mod_rewrite-off-by-one-error-cve-2006-3747/, https://www.rapid7.com/db/vulnerabilities/apache-httpd-1_3_x-mod_rewrite-off-by-one-error-cve-2006-3747/, https://www.rapid7.com/db/vulnerabilities/hpsmh-cve-2006-3747/, https://www.rapid7.com/db/vulnerabilities/apache-httpd-cve-2006-3747/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2006-3747/, https://www.rapid7.com/db/vulnerabilities/freebsd-vid-dc8c08c7-1e7c-11db-88cf-000c6ec775d9/, https://www.rapid7.com/db/vulnerabilities/apple-osx-apache-cve-2006-3747/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2006-3747/, https://www.rapid7.com/db/vulnerabilities/http-apache-mod-rewrite-bof/
Platforms Tested: Windows 2003 CN SP1
2007
Apache mod_rewrite off-by-one(Win32) Exploit
This exploit targets the Apache mod_rewrite vulnerability on Win32 systems. It allows an attacker to trigger a buffer overflow through the 'ldap://' parameter in the GET request. The vulnerability was discovered by Mark Dowd and assigned CVE-2006-3747. The exploit does not require any opcodes under Windows and directly runs the attacker's shellcode. The vulnerable Apache versions are 1.3 branch (>1.3.28 and <1.3.37), 2.0 branch (>2.0.46 and <2.0.59), and 2.2 branch (>2.2.0 and <2.2.3). Some compilers may add padding to the stack, making them non-exploitable.
Mitigation:
Apply the necessary patches or updates to the Apache server to address the vulnerability. Upgrading to a non-vulnerable version is recommended.