Overview
There is a buffer overflow vulnerability in ap_resolve_env() function of Apache that could allow a local user to gain elevated privileges.
Description
| The Apache HTTP Server is a freely available web server that runs on a variety of operating systems including Unix, Linux, and Microsoft Windows. The ap_resolve_env() function is responsible for expanding environment variables when parsing configurations files such as .htaccess or httpd.conf. There is a vulnerability in this function that could allow a local user to trigger a buffer overflow. The Apache Software Foundation notes that in order to exploit this vulnerability, a local user would need to install the malicious configuration file on the server and force the server to parse this file. | 
Impact
| A local user with the ability to force a vulnerable to server to parse a malicious configuration file could gain elevated privileges. | 
Solution
| Upgrade or Apply Patch | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
This vulnerability was reported by the Swedish IT Incident Centre within the National Post and Telecom Agency (SITIC).
This document was written by Damon Morda.
Other Information
| CVE IDs: | CVE-2004-0747 | 
| Severity Metric: | 3.38 | 
| Date Public: | 2004-09-15 | 
| Date First Published: | 2004-09-17 | 
| Date Last Updated: | 2004-09-17 20:09 UTC | 
| Document Revision: | 11 |