{"vuid":"VU#366020","idnumber":"366020","name":"Apache mod_tcl module contains a format string error","keywords":["Apache","HTTP Server","format string error","mod_tcl module","set_var function","tcl_cmds.c","tcl_core.c","httpd"],"overview":"A format string vulnerability exists in the mod_tcl Apache module. This vulnerability may allow a remote attacker to execute arbitrary code.","clean_desc":"The Apache HTTP Server, also known as httpd, is an open-source HTTP server that runs on Microsoft Windows, Linux, Unix, and Apple OS X Operating Systems. Apache modules can be used to extend the functionality of the Apache web server. The mod_tcl module is a scripting module that allows Apache to run TCL scripts natively. There is a format string vulnerability in the mod_tcl module that may allow an attacker to execute arbitrary code.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the httpd process.","resolution":"Upgrade\nThe mod_tcl team has released an upgrade that addresses this issue.","workarounds":"Install only required modules Only install the modules that are necessary for the operation of the web server. Restrict access Restricting access to a vulnerable system to trusted hosts until an upgrade can be applied may mitigate the affects of this vulnerability.","sysaffected":"","thanks":"Thanks to the mod_tcl and Gentoo teams for providing information about this vulnerability.","author":"This document was written by Ryan Giobbi.","public":["http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=421","http://secunia.com/advisories/22458/","http://xforce.iss.net/xforce/xfdb/29550","http://security.gentoo.org/glsa/glsa-200610-12.xml","http://secunia.com/advisories/22549/"],"cveids":["CVE-2006-4154"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-11-06T18:43:45Z","publicdate":"2006-10-14T00:00:00Z","datefirstpublished":"2006-11-07T18:54:13Z","dateupdated":"2006-11-07T18:56:18Z","revision":27,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"5","cam_impact":"14","cam_easeofexploitation":"8","cam_attackeraccessrequired":"19","cam_scorecurrent":"3.99","cam_scorecurrentwidelyknown":"4.9875","cam_scorecurrentwidelyknownexploited":"8.9775","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":3.99,"vulnote":null}