Full Disclosure mailing list archives
[ GLSA 200409-21 ] Apache 2, mod_dav: Multiple vulnerabilities
From: Thierry Carrez <koon () gentoo org>
Date: Thu, 16 Sep 2004 22:50:19 +0200
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 200409-21 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Apache 2, mod_dav: Multiple vulnerabilities Date: September 16, 2004 Bugs: #62626, #63948, #64145 ID: 200409-21 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Several vulnerabilities have been found in Apache 2 and mod_dav for Apache 1.3 which could allow a remote attacker to cause a Denial of Service or a local user to get escalated privileges. Background ========== The Apache HTTP server is one of most popular web servers on the internet. mod_ssl provides SSL v2/v3 and TLS v1 support for it and mod_dav is the Apache module for Distributed Authoring and Versioning (DAV). Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-www/apache < 2.0.51 >= 2.0.51 < 2.0 2 net-www/mod_dav <= 1.0.3-r1 >= 1.0.3-r2 ------------------------------------------------------------------- 2 affected packages on all of their supported architectures. ------------------------------------------------------------------- Description =========== A potential infinite loop has been found in the input filter of mod_ssl (CAN-2004-0748) as well as a possible segmentation fault in the char_buffer_read function if reverse proxying to a SSL server is being used (CAN-2004-0751). Furthermore, mod_dav, as shipped in Apache httpd 2 or mod_dav 1.0.x for Apache 1.3, contains a NULL pointer dereference which can be triggered remotely (CAN-2004-0809). The third issue is an input validation error found in the IPv6 URI parsing routines within the apr-util library (CAN-2004-0786). Additionally a possible buffer overflow has been reported when expanding environment variables during the parsing of configuration files (CAN-2004-0747). Impact ====== A remote attacker could cause a Denial of Service either by aborting a SSL connection in a special way, resulting in CPU consumption, by exploiting the segmentation fault in mod_ssl or the mod_dav flaw. A remote attacker could also crash a httpd child process by sending a specially crafted URI. The last vulnerabilty could be used by a local user to gain the privileges of a httpd child, if the server parses a carefully prepared .htaccess file. Workaround ========== There is no known workaround at this time. Resolution ========== All Apache 2 users should upgrade to the latest version: # emerge sync # emerge -pv ">=net-www/apache-2.0.51" # emerge ">=net-www/apache-2.0.51" All mod_dav users should upgrade to the latest version: # emerge sync # emerge -pv ">=net-www/mod_dav-1.0.3-r2" # emerge ">=net-www/mod_dav-1.0.3-r2" References ========== [ 1 ] CAN-2004-0747 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747 [ 2 ] CAN-2004-0748 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0748 [ 3 ] CAN-2004-0751 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0751 [ 4 ] CAN-2004-0786 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0786 [ 5 ] CAN-2004-0809 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0809 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200409-21.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security () gentoo org or alternatively, you may file a bug at http://bugs.gentoo.org. License ======= Copyright 2004 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/1.0 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFBSfyLvcL1obalX08RAgxBAJ4poCE8u69805Aog8dV9JfyXhOx/gCfcB+6 wmQyV3UBLPkFxVhtVkfQVjY= =zVd0 -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- [ GLSA 200409-21 ] Apache 2, mod_dav: Multiple vulnerabilities Thierry Carrez (Sep 16)