lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 29 Oct 2003 14:17:41 -0800
From: Immunix Security Team <security@...unix.com>
To: bugtraq@...urityfocus.com
Subject: Immunix Secured OS 7+ apache update

[Please do not use vacation(1), procmail(1), or "Out of Office
Autoreply" features on public mail lists. Thanks.]

-----------------------------------------------------------------------
	Immunix Secured OS Security Advisory

Packages updated:	apache
Affected products:	Immunix OS 7+
Bugs fixed:		CAN-2003-0542
Date:			Tue Oct 28 2003
Advisory ID:		IMNX-2003-7+-025-01
Author:			Seth Arnold <sarnold@...unix.com>
-----------------------------------------------------------------------

Description:
  André Malo discovered two stack-based overflows in the Apache web
  server; one in mod_alias, the other in mod_rewrite. Quoting from the
  OpenPKG adivsory: "These occurred if a regular expression with more
  than 9 capturing parenthesis was configured. To exploit this, an
  attacker would need to be able to locally create a carefully crafted
  configuration file (.htaccess or httpd.conf)."

  The Common Vulnerabilities and Exposures (CVE) project assigned the id
  CAN-2003-0542 to the problem.

  The vulnerability is in an apache wrapper function around the regex(3)
  interface; the affected uses of ap_regexec() are called with string
  inputs, so it would be difficult to construct the StackGuard canary
  value 0x000aff0d when attempting to overwrite the stack-stored
  regmatch_t structure arrays; thus, we expect StackGuard should prevent
  exploitation of this vulnerability. However, an exhaustive analysis
  has not been performed.

  In the event StackGuard prevents exploitation of this vulnerability,
  the apache process handling the request would still be killed; thus,
  Immunix recommends all users upgrade when convenient.

  References: http://www.securityfocus.com/archive/1/342674
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0542
  http://marc.theaimsgroup.com/?l=apache-cvs&m=106701190026083

Package names and locations:
  Precompiled binary packages for Immunix 7+ are available at:
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/apache-1.3.27-1.7.1_imnx_2.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/apache-devel-1.3.27-1.7.1_imnx_2.i386.rpm
  http://download.immunix.org/ImmunixOS/7+/Updates/RPMS/apache-manual-1.3.27-1.7.1_imnx_2.i386.rpm

  A source package for Immunix 7+ is available at:
  http://download.immunix.org/ImmunixOS/7+/Updates/SRPMS/apache-1.3.27-1.7.1_imnx_2.src.rpm

Immunix OS 7+ md5sums:
  d0f0fa84c2cb84d23f6110faf86e99c9  RPMS/apache-1.3.27-1.7.1_imnx_2.i386.rpm
  52e95aaa3c6acf2f464a0342ba63c360  RPMS/apache-devel-1.3.27-1.7.1_imnx_2.i386.rpm
  3d09e9758813e3b96550ffeba8013c47  RPMS/apache-manual-1.3.27-1.7.1_imnx_2.i386.rpm
  0cd20af663c6f22ee6127ea241269ef5  SRPMS/apache-1.3.27-1.7.1_imnx_2.src.rpm


GPG verification:                                                               
  Our public keys are available at http://download.immunix.org/GPG_KEY
  Immunix, Inc., has changed policy with GPG keys. We maintain several
  keys now: C53B2B53 for Immunix 7+ package signing, D3BA6C17 for
  Immunix 7.3 package signing, and 1B7456DA for general security issues.


NOTE:
  Ibiblio is graciously mirroring our updates, so if the links above are
  slow, please try:
    ftp://ftp.ibiblio.org/pub/Linux/distributions/immunix/
  or one of the many mirrors available at:
    http://www.ibiblio.org/pub/Linux/MIRRORS.html

  ImmunixOS 6.2 is no longer officially supported.
  ImmunixOS 7.0 is no longer officially supported.

Contact information:
  To report vulnerabilities, please contact security@...unix.com.
  Immunix attempts to conform to the RFP vulnerability disclosure protocol
  http://www.wiretrip.net/rfp/policy.html.

Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ