Gentoo Archives: gentoo-announce

From: Sune Kloppenborg Jeppesen <jaervosz@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200705-04 ] Apache mod_perl: Denial of Service
Date: Wed, 02 May 2007 11:18:10
Message-Id: 200705021247.48283.jaervosz@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200705-04
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: Apache mod_perl: Denial of Service
9 Date: May 02, 2007
10 Bugs: #172676
11 ID: 200705-04
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 The mod_perl Apache module is vulnerable to a Denial of Service when
19 processing regular expressions.
20
21 Background
22 ==========
23
24 Mod_perl is an Apache module that embeds the Perl interpreter within
25 the server, allowing Perl-based web-applications to be created.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 www-apache/mod_perl < 1.30 >= 1.30
34 >= 2.0.3-r1
35 www-apache/mod_perl < 2.0.3-r1 >= 1.30
36 >= 2.0.3-r1
37
38 Description
39 ===========
40
41 Alex Solvey discovered that the "path_info" variable used in file
42 RegistryCooker.pm (mod_perl 2.x) or file PerlRun.pm (mod_perl 1.x), is
43 not properly escaped before being processed.
44
45 Impact
46 ======
47
48 A remote attacker could send a specially crafted URL to the vulnerable
49 server, possibly resulting in a massive resource consumption.
50
51 Workaround
52 ==========
53
54 There is no known workaround at this time.
55
56 Resolution
57 ==========
58
59 All mod_perl 1.x users should upgrade to the latest version:
60
61 # emerge --sync
62 # emerge --ask --oneshot --verbose ">=www-apache/mod_perl-1.30"
63
64 All mod_perl 2.x users should upgrade to the latest version:
65
66 # emerge --sync
67 # emerge --ask --oneshot --verbose ">=www-apache/mod_perl-2.0.3-r1"
68
69 References
70 ==========
71
72 [ 1 ] CVE-2007-1349
73 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1349
74
75 Availability
76 ============
77
78 This GLSA and any updates to it are available for viewing at
79 the Gentoo Security Website:
80
81 http://security.gentoo.org/glsa/glsa-200705-04.xml
82
83 Concerns?
84 =========
85
86 Security is a primary focus of Gentoo Linux and ensuring the
87 confidentiality and security of our users machines is of utmost
88 importance to us. Any security concerns should be addressed to
89 security@g.o or alternatively, you may file a bug at
90 http://bugs.gentoo.org.
91
92 License
93 =======
94
95 Copyright 2007 Gentoo Foundation, Inc; referenced text
96 belongs to its owner(s).
97
98 The contents of this document are licensed under the
99 Creative Commons - Attribution / Share Alike license.
100
101 http://creativecommons.org/licenses/by-sa/2.5