- Description
- Buffer overflow in htdigest in Apache 2.0.52 may allow attackers to execute arbitrary code via a long realm argument. NOTE: since htdigest is normally only locally accessible and not setuid or setgid, there are few attack vectors which would lead to an escalation of privileges, unless htdigest is executed from a CGI program. Therefore this may not be a vulnerability.
- Source
- cve@mitre.org
- NVD status
- Analyzed
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- Hype score
- Not currently trending
- Red HatRed Hat does not consider this to be a vulnerability. htdigest is not supplied setuid or setgid and should not be run from a CGI program.
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "ADF4DBF6-DAF0-47E7-863B-C48DB7149A78"
}
],
"operator": "OR"
}
]
}
]