← Zuruck zu CVEs
CVE-2004-2680
N/ABeschreibung
mod_python (libapache2-mod-python) 3.1.4 and earlier does not properly handle when output filters process more than 16384 bytes, which can cause filter.read to return portions of previously freed memory.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht12/31/2004
Zuletzt geandert4/16/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
apache:mod_python
Referenzen
http://mail-archives.apache.org/mod_mbox/httpd-python-dev/200404.mbox/%3c6DCA8C14-8FFA-11D8-8B4E-000A95B0D772%40pixar.com%3e(security@ubuntu.com)
http://mail-archives.apache.org/mod_mbox/httpd-python-dev/200404.mbox/%3cCD485B27-8F3E-11D8-934B-000A95B0D772%40pixar.com%3e(security@ubuntu.com)
http://mail-archives.apache.org/mod_mbox/httpd-python-dev/200404.mbox/%3cEB279100-9000-11D8-8B4E-000A95B0D772%40pixar.com%3e(security@ubuntu.com)
http://secunia.com/advisories/24418(security@ubuntu.com)
http://secunia.com/advisories/24424(security@ubuntu.com)
http://svn.apache.org/viewvc/httpd/mod_python/trunk/src/filterobject.c?r1=102649&r2=103561&pathrev=103561(security@ubuntu.com)
http://www.securityfocus.com/archive/1/462185/100/0/threaded(security@ubuntu.com)
http://www.securityfocus.com/bid/22849(security@ubuntu.com)
http://www.ubuntu.com/usn/usn-430-1(security@ubuntu.com)
http://www.vupen.com/english/advisories/2007/0846(security@ubuntu.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/14751(security@ubuntu.com)
https://issues.rpath.com/browse/RPL-1105(security@ubuntu.com)
https://launchpad.net/bugs/89308(security@ubuntu.com)
http://mail-archives.apache.org/mod_mbox/httpd-python-dev/200404.mbox/%3c6DCA8C14-8FFA-11D8-8B4E-000A95B0D772%40pixar.com%3e(af854a3a-2127-422b-91ae-364da2661108)
http://mail-archives.apache.org/mod_mbox/httpd-python-dev/200404.mbox/%3cCD485B27-8F3E-11D8-934B-000A95B0D772%40pixar.com%3e(af854a3a-2127-422b-91ae-364da2661108)
http://mail-archives.apache.org/mod_mbox/httpd-python-dev/200404.mbox/%3cEB279100-9000-11D8-8B4E-000A95B0D772%40pixar.com%3e(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/24418(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/24424(af854a3a-2127-422b-91ae-364da2661108)
http://svn.apache.org/viewvc/httpd/mod_python/trunk/src/filterobject.c?r1=102649&r2=103561&pathrev=103561(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/462185/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/22849(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-430-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2007/0846(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/14751(af854a3a-2127-422b-91ae-364da2661108)
https://issues.rpath.com/browse/RPL-1105(af854a3a-2127-422b-91ae-364da2661108)
https://launchpad.net/bugs/89308(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.