Apache IPv6 Address Parsing Flaw May Let Remote Users Deny Service
SecurityTracker Alert ID: 1011299|
SecurityTracker URL: http://securitytracker.com/id/1011299
(Links to External Site)
Date: Sep 16 2004
Denial of service via network|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): prior to 2.0.51|
A vulnerability was reported in the Apache web server in the processing of IPv6 addresses. A remote user may be able to cause denial of service conditions.|
The vendor reported that there is an input validation flaw in the IPv6 literal address parsing. A remote user may be able to cause a negative length parameter to be passed to a memcpy() function, resulting in a segmentation fault.
The flaw resides in 'apr-util/test/testuri.c' and 'apr-util/uri/apr_uri.c'.
A remote user may be able to cause denial of service conditions.|
The vendor has issued a fixed version (2.0.51), available at:|
Vendor URL: httpd.apache.org/ (Links to External Site)
Input validation error|
Linux (Any), UNIX (Any), Windows (Any)|
This archive entry has one or more follow-up message(s) listed below.|
Source Message Contents
Date: Wed, 15 Sep 2004 20:50:27 +0200|
Subject: [ANNOUNCE] Apache HTTP Server 2.0.51 Released
-----BEGIN PGP SIGNED MESSAGE-----
The Apache Software Foundation and the The Apache HTTP Server Project
are pleased to announce the release of version 2.0.51 of the Apache
HTTP Server ("Apache"). This Announcement notes the significant
changes in 2.0.51 as compared to 2.0.50.
This version of Apache is principally a bug fix release. Of
particular note is that 2.0.51 addresses five security
An input validation issue in IPv6 literal address parsing which
can result in a negative length parameter being passed to memcpy.
A buffer overflow in configuration file parsing could allow a
local user to gain the privileges of a httpd child if the server
can be forced to parse a carefully crafted .htaccess file.
A segfault in mod_ssl which can be triggered by a malicious
remote server, if proxying to SSL servers has been configured.
A potential infinite loop in mod_ssl which could be triggered
given particular timing of a connection abort.
A segfault in mod_dav_fs which can be remotely triggered by an
indirect lock refresh request.
The Apache HTTP Server Project would like to thank Codenomicon for
supplying copies of their "HTTP Test Tool" used to discover
CAN-2004-0786, and to SITIC for reporting the discovery of
This release is compatible with modules compiled for 2.0.42 and
later versions. We consider this release to be the best version of
Apache available and encourage users of all prior versions to
Apache HTTP Server 2.0.51 is available for download from
Please see the CHANGES_2.0 file, linked from the above page, for
a full list of changes.
Apache 2.0 offers numerous enhancements, improvements, and performance
boosts over the 1.3 codebase. For an overview of new features introduced
after 1.3 please see
When upgrading or installing this version of Apache, please keep
in mind the following:
If you intend to use Apache with one of the threaded MPMs, you must
ensure that the modules (and the libraries they depend on) that you
will be using are thread-safe. Please contact the vendors of these
modules to obtain this information.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)
-----END PGP SIGNATURE-----
To unsubscribe, e-mail: firstname.lastname@example.org
For additional commands, e-mail: email@example.com