CVE-2006-4154 (CNNVD-200610-212)
中文标题:
Apache mod_tcl模块远程格式串处理漏洞
英文标题:
Format string vulnerability in the mod_tcl module 1.0 for Apache 2.x allows context-dependent attack...
漏洞描述
中文描述:
Apache是一款开放源代码WEB服务程序。 Apache的mod_tcl模块中存在编程错误,成功利用这个漏洞的攻击者可能以httpd的权限执行任意指令。 mod_tcl模块允许将用户提供的数据做为一些参数的格式串标识符传送给内部定义变量参数函数。set_var函数声明如下: mod_tcl.h:117:void set_var(Tcl_Interp *interp, char *var1, char *var2, const char *fmt, ...); 对这个函数有几个不安全调用: tcl_cmds.c:437: set_var(interp, nm_var, (char*) key, (char*) val); tcl_cmds.c:2231: set_var(interp, nm_env, env[i], sptr + 1); tcl_core.c:650: set_var(interp, namespc, vl[i].var2, vl[i].var3);
英文描述:
Format string vulnerability in the mod_tcl module 1.0 for Apache 2.x allows context-dependent attackers to execute arbitrary code via format string specifiers that are not properly handled in a set_var function call in (1) tcl_cmds.c and (2) tcl_core.c.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| apache | http_server | 2.0 | - | - |
cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.9 | - | - |
cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.28 | - | - |
cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.32 | - | - |
cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.34 | - | - |
cpe:2.3:a:apache:http_server:2.0.34:beta:win32:*:*:*:*:*
|
| apache | http_server | 2.0.35 | - | - |
cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.36 | - | - |
cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.37 | - | - |
cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.38 | - | - |
cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.39 | - | - |
cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.40 | - | - |
cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.41 | - | - |
cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.42 | - | - |
cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.43 | - | - |
cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.44 | - | - |
cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.45 | - | - |
cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.46 | - | - |
cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.47 | - | - |
cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.48 | - | - |
cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.49 | - | - |
cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.50 | - | - |
cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.51 | - | - |
cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.52 | - | - |
cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.53 | - | - |
cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.54 | - | - |
cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.55 | - | - |
cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.56 | - | - |
cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.57 | - | - |
cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*
|
| apache | http_server | 2.0.58 | - | - |
cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*
|
| apache | http_server | 2.1 | - | - |
cpe:2.3:a:apache:http_server:2.1:*:*:*:*:*:*:*
|
| apache | http_server | 2.1.1 | - | - |
cpe:2.3:a:apache:http_server:2.1.1:*:*:*:*:*:*:*
|
| apache | http_server | 2.1.2 | - | - |
cpe:2.3:a:apache:http_server:2.1.2:*:*:*:*:*:*:*
|
| apache | http_server | 2.1.3 | - | - |
cpe:2.3:a:apache:http_server:2.1.3:*:*:*:*:*:*:*
|
| apache | http_server | 2.1.4 | - | - |
cpe:2.3:a:apache:http_server:2.1.4:*:*:*:*:*:*:*
|
| apache | http_server | 2.1.5 | - | - |
cpe:2.3:a:apache:http_server:2.1.5:*:*:*:*:*:*:*
|
| apache | http_server | 2.1.6 | - | - |
cpe:2.3:a:apache:http_server:2.1.6:*:*:*:*:*:*:*
|
| apache | http_server | 2.2 | - | - |
cpe:2.3:a:apache:http_server:2.2:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.1 | - | - |
cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.2 | - | - |
cpe:2.3:a:apache:http_server:2.2.2:*:windows:*:*:*:*:*
|
| apache | http_server | 2.2.3 | - | - |
cpe:2.3:a:apache:http_server:2.2.3:*:windows:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
AV:N/AC:M/Au:N/C:P/I:P/A:P
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2006-4154 |
2025-11-11 15:17:44 | 2025-11-11 07:32:36 |
| NVD | nvd_CVE-2006-4154 |
2025-11-11 14:51:51 | 2025-11-11 07:41:21 |
| CNNVD | cnnvd_CNNVD-200610-212 |
2025-11-11 15:08:53 | 2025-11-11 07:49:11 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-200610-212
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 6.8
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:P/I:P/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 40
- data_sources: ['cve'] -> ['cve', 'nvd']