ID CVE-2004-2680
Summary mod_python (libapache2-mod-python) 3.1.4 and earlier does not properly handle when output filters process more than 16384 bytes, which can cause filter.read to return portions of previously freed memory.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:mod_python:-:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:-:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:1.9a:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:1.9a:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.7.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.7.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.7.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.7.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.7.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.7.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.7.5:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.7.5:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.7.6:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.7.6:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.7.7:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.7.7:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.7.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.7.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:2.7.9:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:2.7.9:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:3.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:3.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:3.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:3.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:3.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:3.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:3.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:3.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:mod_python:3.1.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:mod_python:3.1.4:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 19-10-2018 - 15:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bid 22849
bugtraq 20070307 rPSA-2007-0051-1 mod_python
confirm
mlist
  • [httpd-python-dev] 20040416 Re: possible bug in filter.write()
  • [httpd-python-dev] 20040416 patch for filterobject.c
  • [httpd-python-dev] 20040416 possible bug in filter.write()
secunia
  • 24418
  • 24424
ubuntu USN-430-1
vupen ADV-2007-0846
xf modpython-outputfilter-info-disclosure(14751)
statements via4
contributor Tomas Hoger
lastmodified 2009-05-21
organization Red Hat
statement Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2004-2680 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/
Last major update 19-10-2018 - 15:30
Published 31-12-2004 - 05:00
Last modified 19-10-2018 - 15:30
Back to Top