Short Name |
SSL:APACHE-MOD-SSL |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
SSL |
Keywords |
Apache mod_ssl ssl_util_uuencode_binary Buffer Overflow |
Release Date |
2013/09/30 |
Update Number |
2303 |
Supported Platforms |
idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability against Apache mod_ssl module. A successful attack can result in a denial-of-service condition on overflowing the buffer.
A stack-based buffer overflow has been reported in the Apache 'mod_ssl' module. This issue is exposed in utility code for uuencoding binary data. This issue would most likely result in a denial of service if triggered, but could theoretically allow arbitrary code to run. The issue is not believed to be exploitable to execute arbitrary code on x86 architectures, but this may not be the case with other architectures.