Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2007-6203

Published: 3 December 2007

Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header from an HTTP request when it is reflected back in a "413 Request Entity Too Large" error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated via an HTTP request containing an invalid Content-length value, a similar issue to CVE-2006-3918.

Notes

AuthorNote
jdstrand
seems a very hard bug to exploit, if at all. See:
http://www-1.ibm.com/support/docview.wss?uid=swg1PK57952
mdeslaur
test available: http://www.securityfocus.com/archive/1/archive/1/484410/100/0/threaded

Priority

Low

Status

Package Release Status
apache2
Launchpad, Ubuntu, Debian
dapper
Released (2.0.55-4ubuntu2.4)
edgy Needed
(reached end-of-life)
feisty Needed
(reached end-of-life)
gutsy
Released (2.2.4-3ubuntu0.2)
hardy Not vulnerable
(2.2.6-3)
intrepid Not vulnerable
(2.2.6-3)
upstream
Released (2.2.6-3)
Patches:
upstream: http://svn.apache.org/viewvc?view=rev&revision=600645
upstream: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/http/http_protocol.c?r1=594839&r2=600645&pathrev=600645
upstream: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/http/http_protocol.c?r1=600645&r2=603346 (not exploitable)