Conectiva alert: apache
DoS in mod_ssl and log escape sequences vulnerability.
|
|
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- --------------------------------------------------------------------------
PACKAGE : apache
SUMMARY : DoS in mod_ssl and log escape sequences vulnerability
DATE : 2004-04-13 16:52:00
ID : CLA-2004:839
RELEVANT
RELEASES : 8, 9
- -------------------------------------------------------------------------
DESCRIPTION
Apache[1] is the most popular webserver in use today.
The Apache team disclosed two vulnerabilities[2] in the Apache Web
Server that affect Conectiva Linux. Both are fixed in this update:
CAN-2003-0020: Unescaped characters in error logs[3]: Apache is not
filtering escape sequences passed by clients as URLs before writing
its error logs. An attacker can exploit this vulnerability to, for
example, pass terminal escape sequences to the logs that when viewed
in vulnerable terminals[4] may trigger the execution of arbitrary
commands. This vulnerability has been fixed in Apache 2.0.49 and a
backported patch is included in this update.
CAN-2004-0113: Denial of Service in mod_ssl[5]: A memory leak has
been discovered in mod_ssl that may be triggered by sending normal
HTTP requests to the Apache HTTPS port. An attacker can exploit this
vulnerability to consume all memory available in the server, thus
causing a denial of service condition. This problem has been fixed in
Apache 2.0.49 and a backported patch is included in this update. This
issue does not affect Conectiva Linux 8 (which has Apache 1.3.X).
Additionally, this update includes a fix for a denial of service
issue[6] which is reported to not affect Apache on Linux systems.
SOLUTION
It is recommended that all Apache users upgrade their packages.
IMPORTANT: it is necessary to manually restart the httpd server after
upgrading the packages. In order to do this, execute the following as
root:
# service httpd stop
(wait a few seconds and check with "pidof httpd" if there are any
httpd processes running. On a busy webserver this could take a little
longer)
# service httpd start
REFERENCES
1.http://apache.httpd.org/
2.http://www.apacheweek.com/features/security-20
3.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020
4.http://www.digitaldefense.net/labs/papers/Termulation.txt
5.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113
6.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174
UPDATED PACKAGES
ftp://atualizacoes.conectiva.com.br/8/RPMS/apache-1.3.28-1U80_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/apache-devel-1.3.28-1U80_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/apache-doc-1.3.28-1U80_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/SRPMS/apache-1.3.28-1U80_3cl.src.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-devel-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-doc-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-htpasswd-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/libapr0-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/libapr-devel-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/libapr-devel-static-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/mod_auth_ldap-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/mod_dav-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/SRPMS/apache-2.0.45-28790U90_6cl.src.rpm
ADDITIONAL INSTRUCTIONS
The apt tool can be used to perform RPM packages upgrades:
- run: apt-get update
- after that, execute: apt-get upgrade
Detailed instructions regarding the use of apt and upgrade examples
can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en
- -------------------------------------------------------------------------
All packages are signed with Conectiva's GPG key. The key and instructions
on how to import it can be found at
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can be
found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en
- -------------------------------------------------------------------------
All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en
- -------------------------------------------------------------------------
Copyright (c) 2004 Conectiva Inc.
http://www.conectiva.com
- -------------------------------------------------------------------------
subscribe: [e-mail:conectiva-updates-subscribe@papaleguas.conectiva.com.br]
unsubscribe: [e-mail:conectiva-updates-unsubscribe@papaleguas.conectiva.com.br]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQFAfEWq42jd0JmAcZARApjMAKDGaOt/LdmwRMrkryAylL6BXvpLzQCg6U4s
aYREPcqykop5dEphzZO0XsY=
=GWUz
-----END PGP SIGNATURE-----
[PARSEASHTML]
|
This topic does not have any threads posted yet!
You cannot post until you login.