Conectiva alert: apache

Posted by dave on Apr 13, 2004 1:32 PM EDT
Mailing list; By Conectiva Updates <secure@conectiva.com.br>
Mail this story
Print this story

DoS in mod_ssl and log escape sequences vulnerability.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------- CONECTIVA LINUX SECURITY ANNOUNCEMENT - --------------------------------------------------------------------------

PACKAGE : apache SUMMARY : DoS in mod_ssl and log escape sequences vulnerability DATE : 2004-04-13 16:52:00 ID : CLA-2004:839 RELEVANT RELEASES : 8, 9

- -------------------------------------------------------------------------

DESCRIPTION Apache[1] is the most popular webserver in use today. The Apache team disclosed two vulnerabilities[2] in the Apache Web Server that affect Conectiva Linux. Both are fixed in this update: CAN-2003-0020: Unescaped characters in error logs[3]: Apache is not filtering escape sequences passed by clients as URLs before writing its error logs. An attacker can exploit this vulnerability to, for example, pass terminal escape sequences to the logs that when viewed in vulnerable terminals[4] may trigger the execution of arbitrary commands. This vulnerability has been fixed in Apache 2.0.49 and a backported patch is included in this update. CAN-2004-0113: Denial of Service in mod_ssl[5]: A memory leak has been discovered in mod_ssl that may be triggered by sending normal HTTP requests to the Apache HTTPS port. An attacker can exploit this vulnerability to consume all memory available in the server, thus causing a denial of service condition. This problem has been fixed in Apache 2.0.49 and a backported patch is included in this update. This issue does not affect Conectiva Linux 8 (which has Apache 1.3.X). Additionally, this update includes a fix for a denial of service issue[6] which is reported to not affect Apache on Linux systems.

SOLUTION It is recommended that all Apache users upgrade their packages. IMPORTANT: it is necessary to manually restart the httpd server after upgrading the packages. In order to do this, execute the following as root: # service httpd stop (wait a few seconds and check with "pidof httpd" if there are any httpd processes running. On a busy webserver this could take a little longer) # service httpd start REFERENCES 1.http://apache.httpd.org/ 2.http://www.apacheweek.com/features/security-20 3.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020 4.http://www.digitaldefense.net/labs/papers/Termulation.txt 5.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113 6.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174

UPDATED PACKAGES ftp://atualizacoes.conectiva.com.br/8/RPMS/apache-1.3.28-1U80_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/apache-devel-1.3.28-1U80_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/RPMS/apache-doc-1.3.28-1U80_3cl.i386.rpm ftp://atualizacoes.conectiva.com.br/8/SRPMS/apache-1.3.28-1U80_3cl.src.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-2.0.45-28790U90_6cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-devel-2.0.45-28790U90_6cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-doc-2.0.45-28790U90_6cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-htpasswd-2.0.45-28790U90_6cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/libapr0-2.0.45-28790U90_6cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/libapr-devel-2.0.45-28790U90_6cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/libapr-devel-static-2.0.45-28790U90_6cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/mod_auth_ldap-2.0.45-28790U90_6cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/mod_dav-2.0.45-28790U90_6cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/SRPMS/apache-2.0.45-28790U90_6cl.src.rpm

ADDITIONAL INSTRUCTIONS The apt tool can be used to perform RPM packages upgrades:

- run: apt-get update - after that, execute: apt-get upgrade

Detailed instructions regarding the use of apt and upgrade examples can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en

- ------------------------------------------------------------------------- All packages are signed with Conectiva's GPG key. The key and instructions on how to import it can be found at http://distro.conectiva.com.br/seguranca/chave/?idioma=en Instructions on how to check the signatures of the RPM packages can be found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en

- ------------------------------------------------------------------------- All our advisories and generic update instructions can be viewed at http://distro.conectiva.com.br/atualizacoes/?idioma=en

- ------------------------------------------------------------------------- Copyright (c) 2004 Conectiva Inc. http://www.conectiva.com

- ------------------------------------------------------------------------- subscribe: [e-mail:conectiva-updates-subscribe@papaleguas.conectiva.com.br] unsubscribe: [e-mail:conectiva-updates-unsubscribe@papaleguas.conectiva.com.br] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org

iD8DBQFAfEWq42jd0JmAcZARApjMAKDGaOt/LdmwRMrkryAylL6BXvpLzQCg6U4s aYREPcqykop5dEphzZO0XsY= =GWUz -----END PGP SIGNATURE-----

[PARSEASHTML]

  Nav
» Read more about: Story Type: Security; Groups: Conectiva

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.