Re: mod_ssl Buffer Overflow Condition (Update Available)

From: Ben Laurie (benat_private)
Date: Fri Mar 01 2002 - 02:28:36 PST

  • Next message: Peter N. Go: "Re: Colbalt-RAQ-v4-Bugs&Vulnerabilities"

    Ed Moyle wrote:
    > 
    > mod_ssl Buffer Overflow Condition (Update Available)
    > --------------------------------------------------------
    > 
    > SYNOPSIS
    > 
    > mod_ssl (www.modssl.org) is a commonly used Apache module that
    > provides strong cryptography for the Apache web server.  The
    > module utilizes OpenSSL (formerly SSLeay) for the SSL implementation.
    > modssl versions prior to 2.8.7-1.3.23 (Feb 23, 2002) make use of the
    > underlying OpenSSL routines in a manner which could overflow a buffer
    > within the implementation.  This situation appears difficult to
    > exploit in a production environment, however, for reasons detailed
    > below.
    
    Ooops! Apologies, I misread my code. Apache-SSL is, in fact, vulnerable
    to this flaw. I'll be issuing an advisory shortly.
    
    Cheers,
    
    Ben.
    
    --
    http://www.apache-ssl.org/ben.html       http://www.thebunker.net/
    
    "There is no limit to what a man can do or how far he can go if he
    doesn't mind who gets the credit." - Robert Woodruff
    



    This archive was generated by hypermail 2b30 : Fri Mar 01 2002 - 13:05:45 PST