Search for vulnerabilities
Vulnerability ID | VCID-cj89-ap45-jueq |
Aliases |
CVE-2006-3747
|
Summary | An off-by-one flaw exists in the Rewrite module, mod_rewrite. Depending on the manner in which Apache httpd was compiled, this software defect may result in a vulnerability which, in combination with certain types of Rewrite rules in the web server configuration files, could be triggered remotely. For vulnerable builds, the nature of the vulnerability can be denial of service (crashing of web server processes) or potentially allow arbitrary code execution. |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 6.2 |
Risk | 10.0 |
Affected and Fixed Packages | Package Details |
There are no known CWE. |
System | Score | Found at |
---|---|---|
epss | 0.92139 | https://api.first.org/data/v1/epss?cve=CVE-2006-3747 |
epss | 0.92139 | https://api.first.org/data/v1/epss?cve=CVE-2006-3747 |
epss | 0.92139 | https://api.first.org/data/v1/epss?cve=CVE-2006-3747 |
epss | 0.92139 | https://api.first.org/data/v1/epss?cve=CVE-2006-3747 |
epss | 0.92418 | https://api.first.org/data/v1/epss?cve=CVE-2006-3747 |
epss | 0.92418 | https://api.first.org/data/v1/epss?cve=CVE-2006-3747 |
epss | 0.92418 | https://api.first.org/data/v1/epss?cve=CVE-2006-3747 |
epss | 0.92418 | https://api.first.org/data/v1/epss?cve=CVE-2006-3747 |
apache_httpd | important | https://httpd.apache.org/security/json/CVE-2006-3747.json |
Reference id | Reference type | URL |
---|---|---|
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3747.json | ||
https://api.first.org/data/v1/epss?cve=CVE-2006-3747 | ||
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3747 | ||
380182 | https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=380182 | |
CVE-2006-3747 | https://httpd.apache.org/security/json/CVE-2006-3747.json | |
CVE-2006-3747;OSVDB-27588 | Exploit | https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/16752.rb |
CVE-2006-3747;OSVDB-27588 | Exploit | https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/3996.c |
OSVDB-27588;CVE-2006-3747 | Exploit | https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/2237.sh |
OSVDB-27588;CVE-2006-3747 | Exploit | https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows_x86/remote/3680.sh |
USN-328-1 | https://usn.ubuntu.com/328-1/ |
Data source | Exploit-DB |
---|---|
Date added | April 6, 2007 |
Description | Apache mod_rewrite (Windows x86) - Off-by-One Remote Overflow |
Ransomware campaign use | Known |
Source publication date | April 7, 2007 |
Exploit type | remote |
Platform | windows_x86 |
Source update date | Jan. 31, 2017 |
Data source | Metasploit |
---|---|
Description | This module exploits the mod_rewrite LDAP protocol scheme handling flaw discovered by Mark Dowd, which produces an off-by-one overflow. Apache versions 1.3.29-36, 2.0.47-58, and 2.2.1-2 are vulnerable. This module requires REWRITEPATH to be set accurately. In addition, the target must have 'RewriteEngine on' configured, with a specific 'RewriteRule' condition enabled to allow for exploitation. The flaw affects multiple platforms, however this module currently only supports Windows based installations. |
Note | Reliability: - unknown-reliability Stability: - unknown-stability SideEffects: - unknown-side-effects |
Ransomware campaign use | Unknown |
Source publication date | July 28, 2006 |
Platform | Windows |
Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/windows/http/apache_mod_rewrite_ldap.rb |
Percentile | 0.99707 |
EPSS Score | 0.92139 |
Published At | Aug. 1, 2025, 12:55 p.m. |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-31T08:28:44.377269+00:00 | Apache HTTPD Importer | Import | https://httpd.apache.org/security/json/CVE-2006-3747.json | 37.0.0 |