mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-09 15:15:46 +02:00
37 lines
1.7 KiB
Markdown
37 lines
1.7 KiB
Markdown
### [CVE-2011-3607](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3607)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/
|
|
- http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html
|
|
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
|
|
- http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/DButter/whitehat_public
|
|
- https://github.com/Dokukin1/Metasploitable
|
|
- https://github.com/GiJ03/ReconScan
|
|
- https://github.com/Iknowmyname/Nmap-Scans-M2
|
|
- https://github.com/NikulinMS/13-01-hw
|
|
- https://github.com/RoliSoft/ReconScan
|
|
- https://github.com/SecureAxom/strike
|
|
- https://github.com/Zhivarev/13-01-hw
|
|
- https://github.com/issdp/test
|
|
- https://github.com/kasem545/vulnsearch
|
|
- https://github.com/matoweb/Enumeration-Script
|
|
- https://github.com/smabramov/Vulnerabilities-and-attacks-on-information-systems
|
|
- https://github.com/syadg123/pigat
|
|
- https://github.com/teamssix/pigat
|
|
- https://github.com/xxehacker/strike
|
|
- https://github.com/zzzWTF/db-13-01
|
|
|