TROYANOSYVIRUS
Voltar para CVEs

CVE-2006-3918

N/A

Descricao

http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.

Detalhes CVE

Pontuacao CVSS v3.1N/A
Publicado7/28/2006
Ultima modificacao4/16/2026
Fontenvd
Avistamentos honeypot0

Produtos afetados

apache:http_servercanonical:ubuntu_linuxdebian:debian_linuxredhat:enterprise_linux_serverredhat:enterprise_linux_workstation

Fraquezas (CWE)

CWE-79

Referencias

http://marc.info/?l=bugtraq&m=125631037611762&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=129190899612998&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=130497311408250&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://openbsd.org/errata.html#httpd2(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2006-0618.html(af854a3a-2127-422b-91ae-364da2661108)
http://rhn.redhat.com/errata/RHSA-2006-0692.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21172(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21174(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21399(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21478(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21598(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21744(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21848(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/21986(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22140(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22317(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/22523(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28749(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29640(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/40256(af854a3a-2127-422b-91ae-364da2661108)
http://securityreason.com/securityalert/1294(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1016569(af854a3a-2127-422b-91ae-364da2661108)
http://svn.apache.org/viewvc?view=rev&revision=394965(af854a3a-2127-422b-91ae-364da2661108)
http://www-1.ibm.com/support/docview.wss?uid=swg1PK24631(af854a3a-2127-422b-91ae-364da2661108)
http://www-1.ibm.com/support/docview.wss?uid=swg24013080(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2006/dsa-1167(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0619.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/19661(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1024144(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-575-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/2963(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/2964(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/3264(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/4207(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/5089(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/1572(af854a3a-2127-422b-91ae-364da2661108)

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.