TROYANOSYVIRUS
Volver a CVEs

CVE-2006-3918

N/A

Descripcion

http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.

Detalles CVE

Puntuacion CVSS v3.1N/A
Publicado7/28/2006
Ultima modificacion4/16/2026
Fuentenvd
Avistamientos honeypot0

Productos afectados

apache:http_servercanonical:ubuntu_linuxdebian:debian_linuxredhat:enterprise_linux_serverredhat:enterprise_linux_workstation

Debilidades (CWE)

CWE-79

Referencias

http://marc.info/?l=bugtraq&m=125631037611762&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=129190899612998&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=130497311408250&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://openbsd.org/errata.html#httpd2(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2006-0618.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2006-0692.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21172(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21174(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21399(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21478(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21598(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21744(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21848(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21986(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22140(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22317(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22523(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28749(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29640(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/40256(af854a3a-2127-422b-91ae-364da2661108)
http://securityreason.com/securityalert/1294(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1016569(af854a3a-2127-422b-91ae-364da2661108)
http://svn.apache.org/viewvc?view=rev&revision=394965(af854a3a-2127-422b-91ae-364da2661108)
http://www-1.ibm.com/support/docview.wss?uid=swg1PK24631(af854a3a-2127-422b-91ae-364da2661108)
http://www-1.ibm.com/support/docview.wss?uid=swg24013080(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2006/dsa-1167(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0619.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/19661(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1024144(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-575-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/2963(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/2964(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/3264(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/4207(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/5089(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/1572(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.