Apache-SSL buffer overflow (fix available)

From: Ben Laurie (benat_private)
Date: Fri Mar 01 2002 - 03:47:36 PST

  • Next message: iphantomiat_private: "Denial of Service in Sphereserver"

    Apache-SSL buffer overflow condition (all versions prior to 1.3.22+1.46)
    ------------------------------------------------------------------------
    
    Synopsis
    --------
    
    A buffer overflow was recently found in mod_ssl, see:
    
    http://archives.neohapsis.com/archives/bugtraq/2002-02/0313.html
    
    for details. The offending code in mod_ssl was, in fact, derived from
    Apache-SSL, and Apache-SSL is also vulnerable.
    
    As in mod_ssl, this flaw can only be exploited if client certificates
    are being used, and the certificate in question must be issued by a
    trusted CA.
    
    Fix
    ---
    
    Download Apache-SSL 1.3.22+1.46 from the usual places (see
    http://www.apache-ssl.org/).
    
    Acknowledgements
    ----------------
    
    Thanks to Ed Moyle for finding the flaw.
    
    Rant
    ----
    
    No thanks to anyone at all for alerting me before going
    public. Cheers, guys.
    
    Links
    -----
    
    This advisory can be found at:
    http://www.apache-ssl.org/advisory-20020301.txt
    
    A mirror which definitely has the new version:
    ftp://opensores.thebunker.net/pub/mirrors/apache-ssl/apache_1.3.22+ssl_1.46.tar.gz
    
    
    Ben Laurie, March 1, 2002.
    
    
    --
    http://www.apache-ssl.org/ben.html       http://www.thebunker.net/
    
    "There is no limit to what a man can do or how far he can go if he
    doesn't mind who gets the credit." - Robert Woodruff
    



    This archive was generated by hypermail 2b30 : Sun Mar 03 2002 - 11:51:43 PST