[CLA-2002:465] Conectiva Linux Security Announcement - apache

From: secureat_private
Date: Mon Mar 04 2002 - 08:54:03 PST

  • Next message: Greg Troxel: "BSD: IPv4 forwarding doesn't consult inbound SPD in KAME-derived IPsec"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - --------------------------------------------------------------------------
    CONECTIVA LINUX SECURITY ANNOUNCEMENT 
    - --------------------------------------------------------------------------
    
    PACKAGE   : apache
    SUMMARY   : Buffer overflow in the mod_ssl module used by apache
    DATE      : 2002-03-04 13:53:00
    ID        : CLA-2002:465
    RELEVANT
    RELEASES  : 5.0, prg graficos, ecommerce, 5.1, 6.0, 7.0
    
    - -------------------------------------------------------------------------
    
    DESCRIPTION
     "mod_ssl"[1] is an Apache module which enables the use of encrypted
     connections ("https://") to the web server and other crypto-related
     functions.
     
     Ed Moyle <emoyleat_private> announced[2] a buffer overflow
     vulnerability[3] in the mod_ssl module. This module is not part of
     the apache distribution, but is bundled and enabled by default in the
     Conectiva Linux Apache packages.
     
     A remote attacker could exploit this vulnerability and execute
     arbitrary commands on the server running apache with this module
     enabled. A probable way to explore this is via client certificate
     authentication, where the attacker would use a specially crafted
     certificate to overflow this buffer. Since this vulnerability happens
     only after the client certificate has been checked, this means that
     it would have to be signed by a CA accepted by the apache server.
    
    
    SOLUTION
     It is recommended that all apache users upgrade their packages. SSL
     support can also be disabled if the update can not be installed
     immediately. To disable it, edit /etc/rc.d/init.d/httpd and remove
     the "-DSSL" parameter.
     
     IMPORTANT: the apache server has to be restarted after upgrading the
     packages. To do this, please execute, as root:
     
     service httpd stop
     
     (wait a few seconds and check with "ps ax|grep httpd" if there are
     any httpd processes running. On a busy webserver this could take a
     little longer.)
     
     service httpd start
     
     
     REFERENCES
     1. http://www.modssl.org
     2. http://online.securityfocus.com/archive/1/258646
     3. http://online.securityfocus.com/bid/4189
    
    
    DIRECT DOWNLOAD LINKS TO THE UPDATED PACKAGES
    ftp://atualizacoes.conectiva.com.br/5.0/SRPMS/apache-1.3.22-1U50_3cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/5.0/i386/apache-1.3.22-1U50_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/5.0/i386/apache-devel-1.3.22-1U50_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/5.0/i386/apache-doc-1.3.22-1U50_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/5.1/SRPMS/apache-1.3.22-1U51_3cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/5.1/i386/apache-1.3.22-1U51_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/5.1/i386/apache-doc-1.3.22-1U51_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/5.1/i386/apache-devel-1.3.22-1U51_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/apache-1.3.22-1U60_3cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/apache-1.3.22-1U60_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/apache-devel-1.3.22-1U60_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/6.0/RPMS/apache-doc-1.3.22-1U60_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/SRPMS/apache-1.3.22-1U70_3cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/apache-1.3.22-1U70_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/apache-devel-1.3.22-1U70_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/7.0/RPMS/apache-doc-1.3.22-1U70_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/ferramentas/ecommerce/SRPMS/apache-1.3.22-1U50_3cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/ferramentas/ecommerce/i386/apache-1.3.22-1U50_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/ferramentas/ecommerce/i386/apache-devel-1.3.22-1U50_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/ferramentas/ecommerce/i386/apache-doc-1.3.22-1U50_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/ferramentas/graficas/SRPMS/apache-1.3.22-1U50_3cl.src.rpm
    ftp://atualizacoes.conectiva.com.br/ferramentas/graficas/i386/apache-1.3.22-1U50_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/ferramentas/graficas/i386/apache-devel-1.3.22-1U50_3cl.i386.rpm
    ftp://atualizacoes.conectiva.com.br/ferramentas/graficas/i386/apache-doc-1.3.22-1U50_3cl.i386.rpm
    
    
    ADDITIONAL INSTRUCTIONS
     Users of Conectiva Linux version 6.0 or higher may use apt to perform 
     upgrades of RPM packages:
     - add the following line to /etc/apt/sources.list if it is not there yet
       (you may also use linuxconf to do this):
    
     rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates
    
    (replace 6.0 with the correct version number if you are not running CL6.0)
    
     - run:                 apt-get update
     - after that, execute: apt-get upgrade
    
     Detailed instructions reagarding the use of apt and upgrade examples 
     can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en
    
    
    - -------------------------------------------------------------------------
    All packages are signed with Conectiva's GPG key. The key and instructions
    on how to import it can be found at 
    http://distro.conectiva.com.br/seguranca/chave/?idioma=en
    Instructions on how to check the signatures of the RPM packages can be
    found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en
    - -------------------------------------------------------------------------
    All our advisories and generic update instructions can be viewed at
    http://distro.conectiva.com.br/atualizacoes/?idioma=en
    
    - -------------------------------------------------------------------------
    subscribe: conectiva-updates-subscribeat_private
    unsubscribe: conectiva-updates-unsubscribeat_private
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.6 (GNU/Linux)
    Comment: For info see http://www.gnupg.org
    
    iD8DBQE8g6ap42jd0JmAcZARAiS8AJ9tRb+5UjqNobWWxGpHrZ6GtAxNuwCePjHv
    dXrZ3p8QGFpodbgny11H4/4=
    =vmlA
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Mon Mar 04 2002 - 22:01:49 PST