Apache 1.3: Buffer overflow vulnerability in mod_include — GLSA 200411-03 A buffer overflow vulnerability exists in mod_include which could possibly allow a local attacker to gain escalated privileges. Affected packages Package www-servers/apache on all architectures Affected versions < 1.3.32-r1 Unaffected versions >= 1.3.32-r1 Background The Apache HTTP server is one of the most popular web servers on the internet. mod_include is an Apache module to handle Server Side Includes (SSI). Description A possible buffer overflow exists in the get_tag() function of mod_include.c. Impact If Server Side Includes (SSI) are enabled, a local attacker may be able to run arbitrary code with the rights of an httpd child process by making use of a specially-crafted document with malformed SSI. Workaround There is no known workaround at this time. Resolution All Apache users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/apache-1.3.32-r1" References CAN-2004-0940 Security vulnerabilities in Apache httpd 1.3