[Full-Disclosure] Apache 2.0 vulnerability affects non-Unix platforms

From: Mark J Cox (mjcat_private)
Date: Fri Aug 09 2002 - 14:07:52 PDT

  • Next message: Scott Lampert: "Re: EEYE: Macromedia Shockwave Flash Malformed Header Overflow"

    -----BEGIN PGP SIGNED MESSAGE-----
    
    For Immediate Disclosure
    
    =============== SUMMARY ================
    
            Title: Apache 2.0 vulnerability affects non-Unix platforms
             Date: 9th August 2002
         Revision: 2
     Product Name: Apache HTTP server 2.0
      OS/Platform: Windows, OS2, Netware
    Permanent URL: http://httpd.apache.org/info/security_bulletin_20020809a.txt
      Vendor Name: Apache Software Foundation
       Vendor URL: http://httpd.apache.org/
          Affects: All Released versions of 2.0 through 2.0.39
         Fixed in: 2.0.40
      Identifiers: CAN-2002-0661
    
    =============== DESCRIPTION ================
    
    Apache is a powerful, full-featured, efficient, and freely-available Web
    server.  On the 7th August 2002, The Apache Software Foundation was
    notified of the discovery of a significant vulnerability, identified by
    Auriemma Luigi <bugtestat_private>.
    
    This vulnerability has the potential to allow an attacker to inflict
    serious damage to a server, and reveal sensitive data.  This vulnerability
    affects default installations of the Apache web server.
    
    Unix and other variant platforms appear unaffected.  Cygwin users are
    likely to be affected.
    
    =============== SOLUTION ================
    
    A simple one line workaround in the httpd.conf file will close the
    vulnerability.  Prior to the first 'Alias' or 'Redirect' directive, add
    the following directive to the global server configuration:
    
       RedirectMatch 400 "\\\.\."
    
    Fixes for this vulnerability are also included in Apache HTTP server
    version 2.0.40.  The 2.0.40 release also contains fixes for two minor
    path-revealing exposures.  This release of Apache is available at
    http://www.apache.org/dist/httpd/
    
    More information will be made available by the Apache Software
    Foundation and Auriemma Luigi <bugtestat_private> in the
    coming weeks.
    
    =============== REFERENCES ================
    
    The Common Vulnerabilities and Exposures project (cve.mitre.org) has
    assigned the name CAN-2002-0661 to this issue.
    
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0661
    
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.6 (GNU/Linux)
    Comment: For info see http://www.gnupg.org
    
    iQCVAwUBPVQvLO6tTP1JpWPZAQEYwgQAqdRDauIcFcBpjwWqLuqPhyHthtOk8Vms
    WSKd5Q4wS8tCX4c1wUskKVyGGVEqACkzqd0Gm3W1I34Q7iJlwBYosVl/00d0IlGY
    tNj+XFB2R2ORT35H0oVjf+La99V1KPmed0+2HzxM6KbSeLWh/H1tRpMHtC0Q9EBK
    GAs3seQmHRI=
    =MfPR
    -----END PGP SIGNATURE-----
    
    _______________________________________________
    Full-Disclosure - We believe in it.
    Full-Disclosureat_private
    http://lists.netsys.com/mailman/listinfo/full-disclosure
    



    This archive was generated by hypermail 2b30 : Fri Aug 09 2002 - 13:31:48 PDT