TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2006-3918

N/A

Beschreibung

http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.

CVE Details

CVSS v3.1 BewertungN/A
Veroffentlicht7/28/2006
Zuletzt geandert4/16/2026
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

apache:http_servercanonical:ubuntu_linuxdebian:debian_linuxredhat:enterprise_linux_serverredhat:enterprise_linux_workstation

Schwachen (CWE)

CWE-79

Referenzen

http://marc.info/?l=bugtraq&m=125631037611762&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=129190899612998&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=130497311408250&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://openbsd.org/errata.html#httpd2(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2006-0618.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2006-0692.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21172(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21174(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21399(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21478(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21598(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21744(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21848(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21986(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22140(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22317(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22523(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28749(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29640(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/40256(af854a3a-2127-422b-91ae-364da2661108)
http://securityreason.com/securityalert/1294(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1016569(af854a3a-2127-422b-91ae-364da2661108)
http://svn.apache.org/viewvc?view=rev&revision=394965(af854a3a-2127-422b-91ae-364da2661108)
http://www-1.ibm.com/support/docview.wss?uid=swg1PK24631(af854a3a-2127-422b-91ae-364da2661108)
http://www-1.ibm.com/support/docview.wss?uid=swg24013080(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2006/dsa-1167(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0619.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/19661(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1024144(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-575-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/2963(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/2964(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/3264(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/4207(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/5089(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/1572(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.