CVE-2006-3918

CVSS V2 Medium 4.3 CVSS V3 None
Description
http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.
Overview
  • CVE ID
  • CVE-2006-3918
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2006-07-28T00:04:00
  • Last Modified Date
  • 2022-09-21T19:35:51
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* 1 OR 1.3.3 1.3.35
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:canonical:ubuntu_linux:7.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_server:2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:redhat:enterprise_linux_workstation:2.0:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:N/I:P/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • NONE
  • Base Score
  • 4.3
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 2.9
References
Reference URL Reference Tags
http://archives.neohapsis.com/archives/bugtraq/2006-05/0151.html Exploit
http://archives.neohapsis.com/archives/bugtraq/2006-07/0425.html Exploit
http://svn.apache.org/viewvc?view=rev&revision=394965 Exploit
http://www-1.ibm.com/support/docview.wss?uid=swg1PK24631
http://secunia.com/advisories/21172 Patch Vendor Advisory
http://secunia.com/advisories/21174 Patch Vendor Advisory
http://securitytracker.com/id?1016569
http://www-1.ibm.com/support/docview.wss?uid=swg24013080
http://rhn.redhat.com/errata/RHSA-2006-0618.html
http://www.redhat.com/support/errata/RHSA-2006-0619.html
http://secunia.com/advisories/21399
http://secunia.com/advisories/21478
http://www.debian.org/security/2006/dsa-1167
ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P
http://secunia.com/advisories/21848
http://secunia.com/advisories/21598
http://secunia.com/advisories/21744
http://www.novell.com/linux/security/advisories/2006_51_apache.html
http://support.avaya.com/elmodocs2/security/ASA-2006-194.htm
http://secunia.com/advisories/21986
http://rhn.redhat.com/errata/RHSA-2006-0692.html
http://secunia.com/advisories/22140
http://openbsd.org/errata.html#httpd2
http://www.securityfocus.com/bid/19661
http://secunia.com/advisories/22317
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=3117
http://secunia.com/advisories/22523
http://kb.vmware.com/KanisaPlatform/Publishing/466/5915871_f.SAL_Public.html
http://securityreason.com/securityalert/1294
http://www.ubuntu.com/usn/usn-575-1
http://secunia.com/advisories/28749
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.html
http://secunia.com/advisories/29640
http://marc.info/?l=bugtraq&m=125631037611762&w=2
http://marc.info/?l=bugtraq&m=129190899612998&w=2
http://www.vupen.com/english/advisories/2006/2964
http://www.vupen.com/english/advisories/2006/5089
http://www.vupen.com/english/advisories/2006/3264
http://www.vupen.com/english/advisories/2006/2963
http://www.vupen.com/english/advisories/2006/4207
http://marc.info/?l=bugtraq&m=130497311408250&w=2
http://www.vupen.com/english/advisories/2010/1572
http://www.f-secure.com/en_EMEA/support/security-advisory/fsc-2010-2.html
http://www.securitytracker.com/id?1024144
http://secunia.com/advisories/40256
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12238
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10352
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rafd145ba6cd0a4ced113a5823cdaff45aeb36eb09855b216401c66d6@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r652fc951306cdeca5a276e2021a34878a76695a9f3cfb6490b4a6840@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/reb542d2038e9c331506e0cbff881b47e40fbe2bd93ff00979e60cdf7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e@%3Ccvs.httpd.apache.org%3E
History
Created Old Value New Value Data Type Notes
2022-05-10 16:13:11 Added to TrackCVE