SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   ht//Dig Vendors:   ht//Dig Group
(Caldera Issues OpenLinux Fix) ht://Dig Search Engine Software Has Remote Denial of Service and Local Information Disclosure Bugs in htsearch
SecurityTracker Alert ID:  1002537
SecurityTracker URL:  http://securitytracker.com/id/1002537
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Oct 12 2001
Impact:   Denial of service via network, Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): OpenLinux Server 3.1 and OpenLinux Workstation 3.1 (all packages prior to htdig-3.1.5-8)
Description:   A vulnerability was reported in the ht://Dig htsearch search engine CGI software that allows remote users to conduct denial of service attacks against the search engine. It also users who can place a special control file on the system to retrieve files from the server.

It is reported that htsearch accepts a -c [filename] option to read in an alternate configuration file. A remote user can specify this command line argument to cause the CGI to stall until it times out or cause it to read in another configuration file.

If a local user places an alternate configuration file on the system, a remote user may then be able to remotely view files on the system that are readable by the web server.

The following type of URLs can be used to trigger this vulnerability:

http://[targethost]/cgi-bin/htsearch?-c/dev/zero
http://[targethost]/cgi-bin/htsearch?-c/path/to/my.file

Impact:   A remote user can cause a denial of service condition. If a local user can place an alternate configuration file on the system (via FTP or Samba or some other means not related to htsearch) and that configuration file is readable by the web server, then a remote user can view files on the system that are readable by the web server.
Solution:   For OpenLinux 3.1 Server, upgraded packages are available at:

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/RPMS
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/SRPMS (for source code)

The verification hashes are:

33b12c381170e69267ffff170b5e7cdc RPMS/htdig-3.1.5-8.i386.rpm
9153eedfb420f574b846e058d198a1f1 SRPMS/htdig-3.1.5-8.src.rpm

The affected packages can reportedly be upgraded with the following commands:

rpm -Fvh htdig-3.1.5-8.i386.rpm

For OpenLinux 3.1 Workstation, the updated packages are available at:

ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/RPMS
ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/SRPMS (for source code)

The verification hashes are:

33b12c381170e69267ffff170b5e7cdc RPMS/htdig-3.1.5-8.i386.rpm
9153eedfb420f574b846e058d198a1f1 SRPMS/htdig-3.1.5-8.src.rpm

The affected packages can reportedly be upgraded with the following commands:

rpm -Fvh htdig-3.1.5-8.i386.rpm

Vendor URL:  www.htdig.org/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Caldera/SCO)

Message History:   This archive entry is a follow-up to the message listed below.
Oct 11 2001 ht://Dig Search Engine Software Has Remote Denial of Service and Local Information Disclosure Bugs in htsearch



 Source Message Contents

Subject:  Security Update: [CSSA-2001-035.0] Linux - Remote File View Problem in htdig


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________
		   Caldera International, Inc.  Security Advisory

Subject:		Linux - Remote File View Problem in htdig
Advisory number: 	CSSA-2001-035.0
Issue date: 		2001, October 09
Cross reference:
______________________________________________________________________________


1. Problem Description

   A security problem in all versions of htdig has been reported to
   bugtraq by the htdig authors. This vulnerability allows an attacker to
   read any files on the system with the privilege of the http server
   account.


2. Vulnerable Versions

   System                       Package
   -----------------------------------------------------------
   OpenLinux 2.3                 not vulnerable                
   
   OpenLinux eServer 2.3.1       not vulnerable                
   and OpenLinux eBuilder                                      
   
   OpenLinux eDesktop 2.4        not vulnerable                
   
   OpenLinux Server 3.1          All packages previous to      
                                 htdig-3.1.5-8                 
   
   OpenLinux Workstation 3.1     All packages previous to      
                                 htdig-3.1.5-8                 
   


3. Solution

   Workaround

     If you do not need htdig, remove the package using
     
      	rpm -e htdig

   The proper solution is to upgrade to the latest packages.

4. OpenLinux 2.3

    not vulnerable

5. OpenLinux eServer 2.3.1 and OpenLinux eBuilder for ECential 3.0

    not vulnerable

6. OpenLinux eDesktop 2.4

    not vulnerable

7. OpenLinux 3.1 Server

    7.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/RPMS

       The corresponding source code package can be found at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Server/current/SRPMS

   7.2 Verification

       33b12c381170e69267ffff170b5e7cdc  RPMS/htdig-3.1.5-8.i386.rpm
       9153eedfb420f574b846e058d198a1f1  SRPMS/htdig-3.1.5-8.src.rpm
       

   7.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

         rpm -Fvh htdig-3.1.5-8.i386.rpm
         

8. OpenLinux 3.1 Workstation

    8.1 Location of Fixed Packages

       The upgrade packages can be found on Caldera's FTP site at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/RPMS

       The corresponding source code package can be found at:

       ftp://ftp.caldera.com/pub/updates/OpenLinux/3.1/Workstation/current/SRPMS

   8.2 Verification

       33b12c381170e69267ffff170b5e7cdc  RPMS/htdig-3.1.5-8.i386.rpm
       9153eedfb420f574b846e058d198a1f1  SRPMS/htdig-3.1.5-8.src.rpm
       

   8.3 Installing Fixed Packages

       Upgrade the affected packages with the following commands:

         rpm -Fvh htdig-3.1.5-8.i386.rpm
         


9. References

   This and other Caldera security resources are located at:

   http://www.caldera.com/support/security/index.html

   This security fix closes Caldera's internal Problem Report 10662.


10. Disclaimer

   Caldera International, Inc. is not responsible for the misuse of
   any of the information we provide on this website and/or through our
   security advisories. Our advisories are a service to our customers
   intended to promote secure installation and use of Caldera OpenLinux.
______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE7wxgA18sy83A/qfwRAr7EAKCTQBrc7wf7gjXQ8Ntbm8nMhoAoqwCgmreE
bessrzL9MILDUFG1KpuVDx8=
=TiJv
-----END PGP SIGNATURE-----



_______________________________________________
Linux-security mailing list
Linux-security@redhat.com
https://listman.redhat.com/mailman/listinfo/linux-security

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC