Debian: apache-ssl multiple vulnerabilities

    Date05 Nov 2002
    CategoryDebian
    2178
    Posted ByLinuxSecurity Advisories
    There are vulnerabilities that could allow an attacker to enact a denial of service against a server or execute a cross scripting attack, or steal cookies from other web site users. Vulnerabilities in the included lecacy programs htdigest, htpasswd and ApacheBench can be exploited when called via CGI.
    
    --------------------------------------------------------------------------
    Debian Security Advisory DSA 188-1                     This email address is being protected from spambots. You need JavaScript enabled to view it. 
    http://www.debian.org/security/                             Martin Schulze
    November 5th, 2002                       http://www.debian.org/security/faq
    --------------------------------------------------------------------------
    
    Package        : apache-ssl
    Vulnerability  : several
    Problem-Type   : remote, local
    Debian-specific: no
    CVE Id         : CAN-2002-0839 CAN-2002-0840 CAN-2002-0843 CAN-2001-0131 CAN-2002-1233
    BugTraq ID     : 5847 5884 5887
    
    According to David Wagner, iDEFENSE and the Apache HTTP Server
    Project, several vulnerabilities have been found in the Apache
    package, a commonly used webserver.  Most of the code is shared
    between the Apache and Apache-SSL packages, so vulnerabilities are
    shared as well.  These vulnerabilities could allow an attacker to
    enact a denial of service against a server or execute a cross
    scripting attack, or steal cookies from other web site users.
    Vulnerabilities in the included lecacy programs htdigest, htpasswd and
    ApacheBench can be exploited when called via CGI.  Additionally the
    insecure temporary file creation in htdigest and htpasswd can also be
    exploited locally.  The Common Vulnerabilities and Exposures (CVE)
    project identified the following vulnerabilities:
    
    1. CAN-2002-0839: A vulnerability exists on platforms using System V
       shared memory based scoreboards.  This vulnerability allows an
       attacker to execute code under the Apache UID to exploit the Apache
       shared memory scoreboard format and send a signal to any process as
       root or cause a local denial of service attack.
    
    2. CAN-2002-0840: Apache is susceptible to a cross site scripting
       vulnerability in the default 404 page of any web server hosted on a
       domain that allows wildcard DNS lookups.
    
    3. CAN-2002-0843: There were some possible overflows in the utility
       ApacheBench (ab) which could be exploited by a malicious server.
    
    4. CAN-2002-1233: A race condition in the htpasswd and htdigest
       program enables a malicious local user to read or even modify the
       contents of a password file or easily create and overwrite files as
       the user running the htpasswd (or htdigest respectively) program.
    5. CAN-2001-0131: htpasswd and htdigest in Apache 2.0a9, 1.3.14, and
       others allows local users to overwrite arbitrary files via a
       symlink attack.
    
       This is the same vulnerability as CAN-2002-1233, which was fixed in
       potato already but got lost later and was never applied upstream.
    
    5. NO-CAN: Several buffer overflows have been found in the ApacheBench
       (ab) utility that could be exploited by a remote server returning
       very long strings.
    
    These problems have been fixed in version 1.3.26.1+1.48-0woody3 for
    the current stable distribution (woody) and in 1.3.9.13-4.2 for the
    old stable distribution (potato).  Corrected packages for the unstable
    distribution (sid) are expected soon.
    
    We recommend that you upgrade your Apache-SSL package immediately.
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 2.2 alias potato
    ---------------------------------
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.9.13-4.2.dsc
          Size/MD5 checksum:      741 9b4125e33235ec9635042f439cb00f56
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.9.13-4.2.diff.gz
          Size/MD5 checksum:    32210 b182c280fef5c37ee5a5beab73ad9719
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.9.13.orig.tar.gz
          Size/MD5 checksum:  2061578 e28b3b656449a5a2f9080286ae3d743e
    
      Alpha architecture:
    
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.9.13-4.2_alpha.deb
          Size/MD5 checksum:   464208 1a4a83064ea982b2c65c6b996089938c
    
      ARM architecture:
    
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.9.13-4.2_arm.deb
          Size/MD5 checksum:   412988 312bd6f05abf39042bc3f1b8decf52e6
    
      Intel IA-32 architecture:
    
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.9.13-4.2_i386.deb
          Size/MD5 checksum:   407672 06e8c865ae2e345ee0d0c79e784d4882
    
      Motorola 680x0 architecture:
    
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.9.13-4.2_m68k.deb
          Size/MD5 checksum:   396318 2ea46b30e0c7c0d1925736b823a6b4a3
    
      PowerPC architecture:
    
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.9.13-4.2_powerpc.deb
          Size/MD5 checksum:   419722 1439a5ea30b4eee1785aca69f4c5a91f
    
      Sun Sparc architecture:
    
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.9.13-4.2_sparc.deb
          Size/MD5 checksum:   421204 89b2c9d9c14720240ef9d85f27edd010
    
    
    Debian GNU/Linux 3.0 alias woody
    --------------------------------
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.26.1+1.48-0woody3.dsc
          Size/MD5 checksum:      755 53845132be2c3c7513caa89d28e0d76a
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.26.1+1.48-0woody3.diff.gz
          Size/MD5 checksum:    38862 95a88e7c3c47467ca5387ebb6a30f899
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.26.1+1.48.orig.tar.gz
          Size/MD5 checksum:  2949638 aeab5d0b18d5275628276e0e4f6031e2
    
      Alpha architecture:
    
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.26.1+1.48-0woody3_alpha.deb
          Size/MD5 checksum:   463040 a6b257bee720e61cf2285fd791872ccf
    
      ARM architecture:
    
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.26.1+1.48-0woody3_arm.deb
          Size/MD5 checksum:   420702 b986bbf04d32abbefcc063f585c732e5
    
      Intel IA-32 architecture:
    
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.26.1+1.48-0woody3_i386.deb
          Size/MD5 checksum:   411798 4a11dfd3197fd18dc39ecb29708c1fe0
    
      Intel IA-64 architecture:
    
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.26.1+1.48-0woody3_ia64.deb
          Size/MD5 checksum:   519094 6b206d1296376e26106c5ea51d51e56c
    
      HP Precision architecture:
    
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.26.1+1.48-0woody3_hppa.deb
          Size/MD5 checksum:   448432 3d4728d15521ec9d71415e17adc0dedb
    
      Motorola 680x0 architecture:
    
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.26.1+1.48-0woody3_m68k.deb
          Size/MD5 checksum:   406288 2775fac4b6755d8fb1bf35f5293a09e8
    
      Big endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.26.1+1.48-0woody3_mips.deb
          Size/MD5 checksum:   433814 dc34a78dba69aac3dcbb9a90418eef1c
    
      Little endian MIPS architecture:
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.26.1+1.48-0woody3_mipsel.deb
          Size/MD5 checksum:   433178 e33531174fa2f640688f8b93d6e23501
    
      PowerPC architecture:
    
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.26.1+1.48-0woody3_powerpc.deb
          Size/MD5 checksum:   424346 57b86247482ef3f8c1220c48b8d2fe0a
    
      IBM S/390 architecture:
    
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.26.1+1.48-0woody3_s390.deb
          Size/MD5 checksum:   422288 f4bef442fe346e0592b06eeeaaa1e020
    
      Sun Sparc architecture:
    
         http://security.debian.org/pool/updates/main/a/apache-ssl/apache-ssl_1.3.26.1+1.48-0woody3_sparc.deb
          Size/MD5 checksum:   421892 d646fb279d579741c57a60a393c97f88
    
    
      These files will probably be moved into the stable distribution on
      its next revision.
    
    ---------------------------------------------------------------------------------
    For apt-get: deb  http://security.debian.org/ stable/updates main
    For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and  http://packages.debian.org/
    
    
    
    
    
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"22","type":"x","order":"1","pct":55,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":12.5,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"13","type":"x","order":"3","pct":32.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.