1 |
-----BEGIN PGP SIGNED MESSAGE----- |
2 |
Hash: SHA1 |
3 |
|
4 |
- - - --------------------------------------------------------------------- |
5 |
GENTOO LINUX SECURITY ANNOUNCEMENT 200305-13 |
6 |
- - - --------------------------------------------------------------------- |
7 |
|
8 |
PACKAGE : apache-2.x |
9 |
SUMMARY : denial of service |
10 |
DATE : 2003-06-01 12:01 UTC |
11 |
EXPLOIT : remote |
12 |
VERSIONS AFFECTED : <apache-2.0.46 |
13 |
FIXED VERSION : >=apache-2.0.46 |
14 |
CVE : CAN-2003-0245 CAN-2003-0189 |
15 |
|
16 |
- - - --------------------------------------------------------------------- |
17 |
|
18 |
- From announcement: |
19 |
|
20 |
"Apache 2.0 versions 2.0.37 through 2.0.45 can be caused to crash in |
21 |
certain circumstances. This can be triggered remotely through mod_dav |
22 |
and possibly other mechanisms. The crash was originally reported by |
23 |
David Endler <DEndler@××××××××.com> and was researched and fixed by |
24 |
Joe Orton <jorton@××××××.com>. Specific details and an analysis of the |
25 |
crash will be published Friday, May 30. No more specific information |
26 |
is disclosed at this time, but all Apache 2.0 users are encouraged to |
27 |
upgrade now." |
28 |
|
29 |
"Apache 2.0 versions 2.0.40 through 2.0.45 on Unix platforms were |
30 |
vulnerable to a denial-of-service attack on the basic authentication |
31 |
module, which was reported by John Hughes <john.hughes@×××××××××.com>. |
32 |
A bug in the configuration scripts caused the apr_password_validate() |
33 |
function to be thread-unsafe on platforms with crypt_r(), including |
34 |
AIX and Linux. All versions of Apache 2.0 have this thread-safety |
35 |
problem on platforms with no crypt_r() and no thread-safe crypt(), |
36 |
such as Mac OS X and possibly others. When using a threaded MPM (which |
37 |
is not the default on these platforms), this allows remote attackers |
38 |
to create a denial of service which causes valid usernames and |
39 |
passwords for Basic Authentication to fail until Apache is restarted. |
40 |
We do not believe this bug could allow unauthorized users to gain |
41 |
access to protected resources." |
42 |
|
43 |
Read the full advisories at: |
44 |
http://www.apache.org/dist/httpd/Announcement2.html |
45 |
http://www.idefense.com/advisory/05.30.03.txt |
46 |
|
47 |
SOLUTION |
48 |
|
49 |
It is recommended that all Gentoo Linux users who are running |
50 |
net-www/apache-2.x upgrade to apache-2.0.46 as follows |
51 |
|
52 |
emerge sync |
53 |
emerge apache |
54 |
emerge clean |
55 |
|
56 |
- - - --------------------------------------------------------------------- |
57 |
aliz@g.o - GnuPG key is available at http://cvs.gentoo.org/~aliz |
58 |
woodchip@g.o |
59 |
- - - --------------------------------------------------------------------- |
60 |
-----BEGIN PGP SIGNATURE----- |
61 |
Version: GnuPG v1.2.2 (GNU/Linux) |
62 |
|
63 |
iD8DBQE+2esxfT7nyhUpoZMRAujeAJ9vVDtNJaOylL/ZoDkmtUC1MOcC9ACfTRoq |
64 |
IEClHmpHv3V8Rt4BwINKyTA= |
65 |
=o3qS |
66 |
-----END PGP SIGNATURE----- |