|
From: Steve D. <sd...@sw...> - 2001-07-28 14:33:22
|
Hello everyone. I received the following alert on the Debian security mailing list. Since it probably applies to many sql-ledger users, I thought I would forward it. I also included Google's cache of the alert since securityfocus seems to be down this morning (how convenient). It's recommended that you upgrade Apache to a secure version immediately. -------- Original Message -------- Subject: [SECURITY] [DSA-067-1] New versions of apache, fixes index bug Resent-From: deb...@li... Date: Sat, 28 Jul 2001 02:59:23 +0200 From: Robert van der Meulen <rv...@wi...> Reply-To: sec...@de... To: deb...@li... -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ Debian Security Advisory DSA-067-1 sec...@de... http://www.debian.org/security/ Robert van der Meulen July 28, 2001 - ------------------------------------------------------------------------ Package : apache,apache-ssl Problem type : remote exploit Debian-specific : no We have received reports that the 'apache' http daemon, as included in the Debian 'stable' distribution, is vulnerable to the 'artificially long slash path directory listing vulnerability' as described in http://www.securityfocus.com/vdb/bottom.html?vid=2503 . This vulnerability was announced to bugtraq by Dan Harkless. Quoting the SecurityFocus entry for this vulnerability: A problem in the package could allow directory indexing, and path discovery. In a default configuration, Apache enables mod_dir, mod_autoindex, and mod_negotiation. However, by placing a custom crafted request to the Apache server consisting of a long path name created artificially by using numerous slashes, this can cause these modules to misbehave, making it possible to escape the error page, and gain a listing of the directory contents. This vulnerability makes it possible for a malicious remote user to launch an information gathering attack, which could potentially result in compromise of the system. Additionally, this vulnerability affects all releases of Apache previous to 1.3.19. **************BUGTRAQ NOTICE************************************* bugtraq id 2503 class Input Validation Error cve CVE-MAP-NOMATCH remote Yes local No published March 13, 2001 updated June 29, 2001 vulnerable Apache Group Apache 1.3.9 - Sun Solaris 8.0_x86 - Sun Solaris 8.0 + Debian Linux 2.2 sparc + Debian Linux 2.2 powerpc + Debian Linux 2.2 arm + Debian Linux 2.2 alpha + Debian Linux 2.2 68k + Debian Linux 2.2 Apache Group Apache 1.3.3 + RedHat Linux 5.2 sparc + RedHat Linux 5.2 i386 + RedHat Linux 5.2 alpha Apache Group Apache 1.3.17win32 - Microsoft Windows ME - Microsoft Windows 98se - Microsoft Windows 98 - Microsoft Windows 95 - Microsoft Windows NT 4.0SP6a + Microsoft Windows NT 4.0 - Microsoft Windows NT 4.0SP6 + Microsoft Windows NT 4.0 - Microsoft Windows NT 4.0SP5 + Microsoft Windows NT 4.0 - Microsoft Windows NT 4.0SP4 + Microsoft Windows NT 4.0 - Microsoft Windows NT 4.0SP3 + Microsoft Windows NT 4.0 - Microsoft Windows NT 4.0SP2 + Microsoft Windows NT 4.0 - Microsoft Windows NT 4.0SP1 + Microsoft Windows NT 4.0 - Microsoft Windows NT 4.0 - Microsoft Windows 2000 SP2 - Microsoft Windows 2000 SP1 - Microsoft Windows 2000 Apache Group Apache 1.3.17 + S.u.S.E. Linux 7.1 + OpenBSD OpenBSD 2.8 Apache Group Apache 1.3.14 + MandrakeSoft Linux Mandrake 7.2 Apache Group Apache 1.3.12 + S.u.S.E. Linux 7.0sparc + S.u.S.E. Linux 7.0 + RedHat Linux 7.0 i386 + RedHat Linux 7.0 alpha + RedHat Linux 6.2 sparc + RedHat Linux 6.2 i386 + RedHat Linux 6.2 alpha not vulnerable Apache Group Apache 1.3.19 - Sun Solaris 8.0 - Sun Solaris 7.0 - SGI IRIX 6.5.9 - SGI IRIX 6.5.8 - S.u.S.E. Linux 7.1 - S.u.S.E. Linux 7.0 - S.u.S.E. Linux 6.4 - RedHat Linux 7.1 - RedHat Linux 7.0 - RedHat Linux 6.2 - OpenBSD OpenBSD 2.9 - OpenBSD OpenBSD 2.8 - NetBSD NetBSD 1.5.1 - NetBSD NetBSD 1.5 - MandrakeSoft Linux Mandrake 8.0 - MandrakeSoft Linux Mandrake 7.2 - MandrakeSoft Linux Mandrake 7.1 - HP HP-UX 11.11 - HP HP-UX 11.0 - HP HP-UX 10.20 - FreeBSD FreeBSD 4.2 - FreeBSD FreeBSD 3.5.1 - Digital (Compaq) TRU64/DIGITAL UNIX 5.0 - Digital (Compaq) TRU64/DIGITAL UNIX 4.0g - Digital (Compaq) TRU64/DIGITAL UNIX 4.0f + Debian Linux 2.3 - Caldera eServer 2.3.1 - Caldera eDesktop 2.4 - Caldera OpenLinux 2.4 |