Gentoo Archives: gentoo-announce

From: Alex Legler <a3li@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200907-02 ] ModSecurity: Denial of Service
Date: Thu, 02 Jul 2009 19:46:15
Message-Id: 1246563512.4324.2.camel@localhost
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200907-02
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: ModSecurity: Denial of Service
9 Date: July 02, 2009
10 Bugs: #262302
11 ID: 200907-02
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Two vulnerabilities in ModSecurity might lead to a Denial of Service.
19
20 Background
21 ==========
22
23 ModSecurity is a popular web application firewall for the Apache HTTP
24 server.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 www-apache/mod_security < 2.5.9 >= 2.5.9
33
34 Description
35 ===========
36
37 Multiple vulnerabilities were discovered in ModSecurity:
38
39 * Juan Galiana Lara of ISecAuditors discovered a NULL pointer
40 dereference when processing multipart requests without a part header
41 name (CVE-2009-1902).
42
43 * Steve Grubb of Red Hat reported that the "PDF XSS protection"
44 feature does not properly handle HTTP requests to a PDF file that do
45 not use the GET method (CVE-2009-1903).
46
47 Impact
48 ======
49
50 A remote attacker might send requests containing specially crafted
51 multipart data or send certain requests to access a PDF file, possibly
52 resulting in a Denial of Service (crash) of the Apache HTTP daemon.
53 NOTE: The PDF XSS protection is not enabled by default.
54
55 Workaround
56 ==========
57
58 There is no known workaround at this time.
59
60 Resolution
61 ==========
62
63 All ModSecurity users should upgrade to the latest version:
64
65 # emerge --sync
66 # emerge --ask --oneshot --verbose ">=www-apache/mod_security-2.5.9"
67
68 References
69 ==========
70
71 [ 1 ] CVE-2009-1902
72 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1902
73 [ 2 ] CVE-2009-1903
74 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1903
75
76 Availability
77 ============
78
79 This GLSA and any updates to it are available for viewing at
80 the Gentoo Security Website:
81
82 http://security.gentoo.org/glsa/glsa-200907-02.xml
83
84 Concerns?
85 =========
86
87 Security is a primary focus of Gentoo Linux and ensuring the
88 confidentiality and security of our users machines is of utmost
89 importance to us. Any security concerns should be addressed to
90 security@g.o or alternatively, you may file a bug at
91 http://bugs.gentoo.org.
92
93 License
94 =======
95
96 Copyright 2009 Gentoo Foundation, Inc; referenced text
97 belongs to its owner(s).
98
99 The contents of this document are licensed under the
100 Creative Commons - Attribution / Share Alike license.
101
102 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature