SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Web Server/CGI)  >   Apache Vendors:   Apache Software Foundation
Apache .htaccess File Integer Overflow Lets Local Users Execute Arbitrary Code
SecurityTracker Alert ID:  1026267
SecurityTracker URL:  http://securitytracker.com/id/1026267
CVE Reference:   CVE-2011-3607   (Links to External Site)
Updated:  Feb 1 2012
Original Entry Date:  Nov 2 2011
Impact:   Execution of arbitrary code via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): prior to 2.2.22
Description:   A vulnerability was reported in Apache. A local user can obtain elevated privileges on the target system.

A local user can create a specially crafted .htaccess file to trigger an integer overflow in ap_pregsub() and execute arbitrary code on the target system with the privileges of the target web service.

A demonstration exploit is available at:

http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html

The original advisory is available at:

http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/

halfdog reported this vulnerability.

Impact:   A local user can obtain elevated privileges on the target system.
Solution:   The vendor has issued a fix (2.2.22).

The vendor's advisory is available at:

http://httpd.apache.org/security/vulnerabilities_22.html

Vendor URL:  httpd.apache.org/ (Links to External Site)
Cause:   Boundary error
Underlying OS:   Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Feb 14 2012 (Red Hat Issues Fix) Apache .htaccess File Integer Overflow Lets Local Users Execute Arbitrary Code   (bugzilla@redhat.com)
Red Hat has issued a fix for Red Hat Enterprise Linux 6.
Feb 22 2012 (Red Hat Issues Fix) Apache .htaccess File Integer Overflow Lets Local Users Execute Arbitrary Code   (bugzilla@redhat.com)
Red Hat has issued a fix for Red Hat Enterprise Linux 5.
Apr 20 2012 (HP Issues Fix for HP-UX) Apache .htaccess File Integer Overflow Lets Local Users Execute Arbitrary Code   (security-alert@hp.com)
HP has issued a fix for HP-UX.



 Source Message Contents

Date:  Wed, 02 Nov 2011 11:55:26 +0000
Subject:  [Full-disclosure] Integer Overflow in Apache ap_pregsub via mod-setenvif

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

An exploitable integer overflow in apache allows to crash the apache
process or execution of arbitrary code as user running apache. To
exploit the vulnerability, a crafted .htaccess file has to be placed
on the server, therefore the vulnerability impact is rated "Low".

Micro-Advisory:
http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/
CVE: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3607

See advisory for more information about the vulnerability and (very
bad) example to execute arbitrary code, using racy code.

It should be possible to execute code without the need for a race
using crafted stop sequences, but I haven't managed to do it so far.
Perhaps someone else might take up the challenge.

hd

- -- 
http://www.halfdog.net/
PGP: 156A AE98 B91F 0114 FE88  2BD8 C459 9386 feed a bee
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk6xLzAACgkQxFmThv7tq+7cfQCdHe9KhFPVQ0qx38+FQtR05aMG
iSAAnjJQ4pEJayrIs9Q62qxOsKsD+pLr
=AHBz
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC