Gentoo Archives: gentoo-announce

From: Daniel Ahlberg <aliz@g.o>
To: gentoo-announce@g.o
Subject: GLSA: apache-2.x (200305-13)
Date: Sun, 01 Jun 2003 12:08:53
Message-Id: 20030601120154.3778A336F4@mail1.tamperd.net
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - ---------------------------------------------------------------------
5 GENTOO LINUX SECURITY ANNOUNCEMENT 200305-13
6 - - - ---------------------------------------------------------------------
7
8 PACKAGE : apache-2.x
9 SUMMARY : denial of service
10 DATE : 2003-06-01 12:01 UTC
11 EXPLOIT : remote
12 VERSIONS AFFECTED : <apache-2.0.46
13 FIXED VERSION : >=apache-2.0.46
14 CVE : CAN-2003-0245 CAN-2003-0189
15
16 - - - ---------------------------------------------------------------------
17
18 - From announcement:
19
20 "Apache 2.0 versions 2.0.37 through 2.0.45 can be caused to crash in
21 certain circumstances. This can be triggered remotely through mod_dav
22 and possibly other mechanisms. The crash was originally reported by
23 David Endler <DEndler@××××××××.com> and was researched and fixed by
24 Joe Orton <jorton@××××××.com>. Specific details and an analysis of the
25 crash will be published Friday, May 30. No more specific information
26 is disclosed at this time, but all Apache 2.0 users are encouraged to
27 upgrade now."
28
29 "Apache 2.0 versions 2.0.40 through 2.0.45 on Unix platforms were
30 vulnerable to a denial-of-service attack on the basic authentication
31 module, which was reported by John Hughes <john.hughes@×××××××××.com>.
32 A bug in the configuration scripts caused the apr_password_validate()
33 function to be thread-unsafe on platforms with crypt_r(), including
34 AIX and Linux. All versions of Apache 2.0 have this thread-safety
35 problem on platforms with no crypt_r() and no thread-safe crypt(),
36 such as Mac OS X and possibly others. When using a threaded MPM (which
37 is not the default on these platforms), this allows remote attackers
38 to create a denial of service which causes valid usernames and
39 passwords for Basic Authentication to fail until Apache is restarted.
40 We do not believe this bug could allow unauthorized users to gain
41 access to protected resources."
42
43 Read the full advisories at:
44 http://www.apache.org/dist/httpd/Announcement2.html
45 http://www.idefense.com/advisory/05.30.03.txt
46
47 SOLUTION
48
49 It is recommended that all Gentoo Linux users who are running
50 net-www/apache-2.x upgrade to apache-2.0.46 as follows
51
52 emerge sync
53 emerge apache
54 emerge clean
55
56 - - - ---------------------------------------------------------------------
57 aliz@g.o - GnuPG key is available at http://cvs.gentoo.org/~aliz
58 woodchip@g.o
59 - - - ---------------------------------------------------------------------
60 -----BEGIN PGP SIGNATURE-----
61 Version: GnuPG v1.2.2 (GNU/Linux)
62
63 iD8DBQE+2esxfT7nyhUpoZMRAujeAJ9vVDtNJaOylL/ZoDkmtUC1MOcC9ACfTRoq
64 IEClHmpHv3V8Rt4BwINKyTA=
65 =o3qS
66 -----END PGP SIGNATURE-----