[Full-Disclosure] Apache Security Vulnerabilities on IRIX

From: SGI Security Coordinator (agent99at_private)
Date: Tue Nov 12 2002 - 15:42:44 PST

  • Next message: Michael Wojcik: "RE: When scrubbing secrets in memory doesn't work"

    -----BEGIN PGP SIGNED MESSAGE-----
    
    ______________________________________________________________________________
                              SGI Security Advisory
    
    Title    : Apache Security Vulnerabilities
    Number   : 20021105-01-I
    Date     : November 12, 2002
    Reference: CVE CAN-2002-0843, CAN-2002-0839, CAN-2002-0840
    Reference: SGI BUG 869356
    Fixed in : sgi_apache-1.3.27-BETA "patch" found on
    Fixed in : ftp://patches.sgi.com/support/free/security/beta/apache-1.3.27/
    Fixed in : sgi_apache v1.3.27 on IRIX 6.5.19 Apps CD
    ______________________________________________________________________________
    
    - -----------------------
    - --- Issue Specifics ---
    - -----------------------
    
    It's been reported that Apache versions prior to 1.3.27 have the following
    vulnerabilities:
    
        o  Buffer overflows in ab utility
    
           Buffer overflows in the benchmarking utility ab can be exploited if
           ab is run against a malicious server
    
        o  Shared memory permissions lead to local privilege escalation
    
           The permissions of the shared memory used for the scoreboard allows
           an attacker who can execute under the Apache UID to send a signal to
           any process as root or cause a local denial of service attack.
    
        o  Error page XSS using wildcard DNS CAN-2002-0840
    
           Cross-site scripting (XSS) vulnerability in the default error page of
           Apache 2.0 before 2.0.43, and 1.3.x up to 1.3.26, when
           UseCanonicalName is "Off" and support for wildcard DNS is present,
           allows remote attackers to execute script as other web page visitors
           via the Host: header.
    
    See: http://www.apacheweek.com/features/security-13 for further details.
    
    These vulnerabilities were assigned the following CVEs:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0843
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0839
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840
    
    SGI has investigated the issue and recommends the following steps for
    neutralizing the exposure.  It is HIGHLY RECOMMENDED that these measures be
    implemented on ALL vulnerable SGI systems.
    
    These issues will be corrected in future releases of IRIX.
    
    
    - --------------
    - --- Impact ---
    - --------------
    
    The Apache webserver is supplied with IRIX versions since 6.5.12m/f as a
    replacement for the older SGI FastTrack server.  It is installed by default,
    and is enabled through "chkconfig" by default.
    
    In order to determine if the Apache webserver is installed, execute the
    following command:
    
      # versions -b | grep apache
    
      If the following line is returned you are OK (ignore the date):
    
      I  sgi_apache       11/15/2002  SGI Web Server based on Apache, 1.3.27
    
      If any earlier version is shown you are vulnerable.
    
    These vulnerabilities might lead to a root compromise in some
    configurations, and no local account is required.
    
    These vulnerabilities have been reported by CVE and have been publicly
    discussed in Usenet newsgroups and mailing lists.
    
    To determine the version of IRIX you are running, execute the following
    command:
    
      # /bin/uname -R
    
    That will return a result similar to the following:
    
      # 6.5 6.5.16f
    
    The first number ("6.5") is the release name, the second ("6.5.16f" in this
    case) is the extended release name.  The extended release name is the
    "version" we refer to throughout this document.
    
    
    - ----------------------------
    - --- Temporary Workaround ---
    - ----------------------------
    
    SGI acknowledges that it may not always be possible to immediately install
    patches or upgrade the operating system.  In those cases, we recommend
    removing the Apache webserver and associated products by using the following
    commands:
    
      # versions remove sgi_apache\*
      # versions remove websetup\*
      # versions remove gateway\*
    
    It is not necessary to reboot the system after doing this.  You should
    follow the recommendations in the "Temporary Solution" section below as soon
    as it is possible to do so.
    
    
    - --------------------------
    - --- Temporary Solution ---
    - --------------------------
    
    SGI is working on providing a new Apache version.  In the interim, we have
    provided a BETA copy of Apache which should address the security matter. Our
    recommendation is to upgrade to IRIX 6.5.19 when available and install the
    Apache version on the Applications CD, or install the distribution from the
    ftp site noted below.
    
       OS Version     Vulnerable?     Patch #      Other Actions
       ----------     -----------     -------      -------------
       IRIX 3.x        unknown                     Note 1
       IRIX 4.x        unknown                     Note 1
       IRIX 5.x        unknown                     Note 1
       IRIX 6.0.x      unknown                     Note 1
       IRIX 6.1        unknown                     Note 1
       IRIX 6.2        unknown                     Note 1
       IRIX 6.3        unknown                     Note 1
       IRIX 6.4        unknown                     Note 1
       IRIX 6.5          yes                       Notes 2 & 3
       IRIX 6.5.1        yes                       Notes 2 & 3
       IRIX 6.5.2        yes                       Notes 2 & 3
       IRIX 6.5.3        yes                       Notes 2 & 3
       IRIX 6.5.4        yes                       Notes 2 & 3
       IRIX 6.5.5        yes                       Notes 2 & 3
       IRIX 6.5.6        yes                       Notes 2 & 3
       IRIX 6.5.7        yes                       Notes 2 & 3
       IRIX 6.5.8        yes                       Notes 2 & 3
       IRIX 6.5.9        yes                       Notes 2 & 3
       IRIX 6.5.10       yes                       Notes 2 & 3
       IRIX 6.5.11       yes                       Notes 2 & 3
       IRIX 6.5.12       yes                       Notes 2 & 3
       IRIX 6.5.13       yes                       Notes 2 & 3
       IRIX 6.5.14       yes                       Notes 3 & 4
       IRIX 6.5.15       yes                       Notes 3 & 4
       IRIX 6.5.16       yes                       Notes 3 & 4
       IRIX 6.5.17       yes                       Notes 3 & 4
       IRIX 6.5.18       yes                       Notes 3 & 4
       IRIX 6.5.19       no
    
       NOTES
    
       1) This version of the IRIX operating has been retired. Upgrade to an
          actively supported IRIX operating system.  See
          http://support.sgi.com/irix/news/index.html#policy for more
          information.
    
       2) If you have not received an IRIX 6.5.X CD for IRIX 6.5, contact your
          SGI Support Provider or URL: http://support.sgi.com/irix/swupdates/
    
       3) Upgrade to IRIX 6.5.19 when released and install the Apache
          distribution from the Applications CD
    
       4) Install the Apache distribution located at:
          ftp://patches.sgi.com/support/free/security/beta/apache-1.3.27/
          Please note that this version will not be supported on Irix versions
          prior to 6.5.14.
    
                    ##### Patch File Checksums ####
    
    The actual patch will be a tar file containing the following files:
    
    Filename:                 sgi_apache
    Algorithm #1 (sum -r):    11059 5 sgi_apache
    Algorithm #2 (sum):       39872 5 sgi_apache
    MD5 checksum:             C83DA535714AC4D157BD884695902D2D
    
    Filename:                 sgi_apache.books
    Algorithm #1 (sum -r):    53491 3334 sgi_apache.books
    Algorithm #2 (sum):       3618 3334 sgi_apache.books
    MD5 checksum:             68457FA5B900979136B14A6F7C9A9F35
    
    Filename:                 sgi_apache.idb
    Algorithm #1 (sum -r):    58058 284 sgi_apache.idb
    Algorithm #2 (sum):       58597 284 sgi_apache.idb
    MD5 checksum:             41584996C3CBD440540C941EA9B95F4E
    
    Filename:                 sgi_apache.man
    Algorithm #1 (sum -r):    08314 98 sgi_apache.man
    Algorithm #2 (sum):       35168 98 sgi_apache.man
    MD5 checksum:             AA095B6BC2F1C6A62FD4A81E4021E641
    
    Filename:                 sgi_apache.src
    Algorithm #1 (sum -r):    09105 6412 sgi_apache.src
    Algorithm #2 (sum):       33444 6412 sgi_apache.src
    MD5 checksum:             3C0D14E5185FA0E871DC8507C689C5A9
    
    Filename:                 sgi_apache.sw
    Algorithm #1 (sum -r):    34276 1858 sgi_apache.sw
    Algorithm #2 (sum):       13640 1858 sgi_apache.sw
    MD5 checksum:             2BB483DDED4DD1CC05FCEE3667A9B75F
    
    
    - ------------------------
    - --- Acknowledgments ----
    - ------------------------
    
    SGI wishes to thank iDefense, Matthew Murphy, David Wagner, FIRST and the
    users of the Internet Community at large for their assistance in this
    matter.
    
    
    - -------------
    - --- Links ---
    - -------------
    
    SGI Security Advisories can be found at:
    http://www.sgi.com/support/security/ and
    ftp://patches.sgi.com/support/free/security/advisories/
    
    SGI Security Patches can be found at:
    http://www.sgi.com/support/security/ and
    ftp://patches.sgi.com/support/free/security/patches/
    
    SGI patches for IRIX can be found at the following patch servers:
    http://support.sgi.com/irix/ and ftp://patches.sgi.com/
    
    SGI freeware updates for IRIX can be found at:
    http://freeware.sgi.com/
    
    SGI fixes for SGI open sourced code can be found on:
    http://oss.sgi.com/projects/
    
    SGI patches and RPMs for Linux can be found at:
    http://support.sgi.com/linux/ or
    http://oss.sgi.com/projects/sgilinux-combined/download/security-fixes/
    
    SGI patches for Windows NT or 2000 can be found at:
    http://support.sgi.com/nt/
    
    IRIX 5.2-6.4 Recommended/Required Patch Sets can be found at:
    http://support.sgi.com/irix/ and ftp://patches.sgi.com/support/patchset/
    
    IRIX 6.5 Maintenance Release Streams can be found at:
    http://support.sgi.com/colls/patches/tools/relstream/index.html
    
    IRIX 6.5 Software Update CDs can be obtained from:
    http://support.sgi.com/irix/swupdates/
    
    The primary SGI anonymous FTP site for security advisories and patches is
    patches.sgi.com (216.32.174.211).  Security advisories and patches are
    located under the URL ftp://patches.sgi.com/support/free/security/
    
    For security and patch management reasons, ftp.sgi.com (mirrors
    patches.sgi.com security FTP repository) lags behind and does not do a
    real-time update.
    
    
    - -----------------------------------------
    - --- SGI Security Information/Contacts ---
    - -----------------------------------------
    
    If there are questions about this document, email can be sent to
    security-infoat_private
    
                          ------oOo------
    
    SGI provides security information and patches for use by the entire SGI
    community.  This information is freely available to any person needing the
    information and is available via anonymous FTP and the Web.
    
    The primary SGI anonymous FTP site for security advisories and patches is
    patches.sgi.com (216.32.174.211).  Security advisories and patches are
    located under the URL ftp://patches.sgi.com/support/free/security/
    
    The SGI Security Headquarters Web page is accessible at the URL:
    http://www.sgi.com/support/security/
    
    For issues with the patches on the FTP sites, email can be sent to
    security-infoat_private
    
    For assistance obtaining or working with security patches, please
    contact your SGI support provider.
    
                          ------oOo------
    
    SGI provides a free security mailing list service called wiretap and
    encourages interested parties to self-subscribe to receive (via email) all
    SGI Security Advisories when they are released. Subscribing to the mailing
    list can be done via the Web
    (http://www.sgi.com/support/security/wiretap.html) or by sending email to
    SGI as outlined below.
    
    % mail wiretap-requestat_private
    subscribe wiretap <YourEmailAddress such as aaanalystat_private >
    end
    ^d
    
    In the example above, <YourEmailAddress> is the email address that you wish
    the mailing list information sent to.  The word end must be on a separate
    line to indicate the end of the body of the message. The control-d (^d) is
    used to indicate to the mail program that you are finished composing the
    mail message.
    
    
                          ------oOo------
    
    SGI provides a comprehensive customer World Wide Web site. This site is
    located at http://www.sgi.com/support/security/ .
    
                          ------oOo------
    
    If there are general security questions on SGI systems, email can be sent to
    security-infoat_private
    
    For reporting *NEW* SGI security issues, email can be sent to
    security-alertat_private or contact your SGI support provider.  A support
    contract is not required for submitting a security report.
    
    ______________________________________________________________________________
          This information is provided freely to all interested parties
          and may be redistributed provided that it is not altered in any
          way, SGI is appropriately credited and the document retains and
          includes its valid PGP signature.
    
    -----BEGIN PGP SIGNATURE-----
    Version: 2.6.2
    
    iQCVAwUBPdGRU7Q4cFApAP75AQHJ7QQAmX2OxzrjKv2Q5xXDByAbi/TslalJlhXK
    eAf4W+Iu/oy0+QVqXRZ6TV8nTgVQIFffFDyXDE8FYWGO6DNFM0mJsyiDjtRRrxCR
    4zgKp+88ytZj4fseOWtFvjsK+p4LYfTel5g0u7tX4jQsuVOLEQPe9CKsTE0bB8Zk
    kCOoskFjRc4=
    =LLu4
    -----END PGP SIGNATURE-----
    
    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html
    



    This archive was generated by hypermail 2b30 : Tue Nov 12 2002 - 16:07:36 PST