SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   Apache HTTPD Vendors:   Apache Software Foundation
(Conectiva Issues Fix) Apache Web Server Socket Starvation Flaw May Let Remote Users Deny Service
SecurityTracker Alert ID:  1009774
SecurityTracker URL:  http://securitytracker.com/id/1009774
CVE Reference:   CVE-2004-0174   (Links to External Site)
Date:  Apr 14 2004
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.0.48 and prior versions; 1.3.29 and prior versions
Description:   A vulnerability was reported in the Apache web server. A remote user may be able to cause denial of service conditions.

It is reported that a remote user can establish a short-lived connection to a rarely-accessed listening socket on the target server. This may cause the Apache child process to block new connections until another connection arrives on the rarely-accessed listening socket.

The report indicates that some versions of AIX, Solaris, and Tru64 UNIX are affected, but that FreeBSD and Linux systems are not affected.

Impact:   A remote user may be able to cause the target server to deny connection requests.
Solution:   Conectiva has released a fix.

ftp://atualizacoes.conectiva.com.br/8/RPMS/apache-1.3.28-1U80_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/apache-devel-1.3.28-1U80_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/apache-doc-1.3.28-1U80_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/SRPMS/apache-1.3.28-1U80_3cl.src.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-devel-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-doc-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-htpasswd-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/libapr0-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/libapr-devel-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/libapr-devel-static-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/mod_auth_ldap-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/mod_dav-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/SRPMS/apache-2.0.45-28790U90_6cl.src.rpm

[Editor's note: The original vulnerability report indicated that this flaw does not affect Linux. However, this Conectiva update includes a fix for the flaw.]

Vendor URL:  httpd.apache.org/ (Links to External Site)
Cause:   Resource error
Underlying OS:  Linux (Conectiva)
Underlying OS Comments:  Reportedly does not affect FreeBSD or Linux, but this Conectiva patch includes the fix anyway; Conectiva 8, 9

Message History:   This archive entry is a follow-up to the message listed below.
Mar 19 2004 Apache Web Server Socket Starvation Flaw May Let Remote Users Deny Service



 Source Message Contents

Subject:  [conectiva-updates] [CLA-2004:839] Conectiva Security Announcement - apache


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
CONECTIVA LINUX SECURITY ANNOUNCEMENT 
- --------------------------------------------------------------------------

PACKAGE   : apache
SUMMARY   : DoS in mod_ssl and log escape sequences vulnerability
DATE      : 2004-04-13 16:52:00
ID        : CLA-2004:839
RELEVANT
RELEASES  : 8, 9

- -------------------------------------------------------------------------

DESCRIPTION
 Apache[1] is the most popular webserver in use today.
 
 The Apache team disclosed two vulnerabilities[2] in the Apache Web
 Server that affect Conectiva Linux. Both are fixed in this update:
 
 CAN-2003-0020: Unescaped characters in error logs[3]: Apache is not
 filtering escape sequences passed by clients as URLs before writing
 its error logs. An attacker can exploit this vulnerability to, for
 example, pass terminal escape sequences to the logs that when viewed
 in vulnerable terminals[4] may trigger the execution of arbitrary
 commands. This vulnerability has been fixed in Apache 2.0.49 and a
 backported patch is included in this update.
 
 CAN-2004-0113: Denial of Service in mod_ssl[5]: A memory leak has
 been discovered in mod_ssl that may be triggered by sending normal
 HTTP requests to the Apache HTTPS port. An attacker can exploit this
 vulnerability to consume all memory available in the server, thus
 causing a denial of service condition. This problem has been fixed in
 Apache 2.0.49 and a backported patch is included in this update. This
 issue does not affect Conectiva Linux 8 (which has Apache 1.3.X).
 
 Additionally, this update includes a fix for a denial of service
 issue[6] which is reported to not affect Apache on Linux systems.


SOLUTION
 It is recommended that all Apache users upgrade their packages.
 
 IMPORTANT: it is necessary to manually restart the httpd server after
 upgrading the packages. In order to do this, execute the following as
 root:
 
 # service httpd stop
 
 (wait a few seconds and check with "pidof httpd" if there are any
 httpd processes running. On a busy webserver this could take a little
 longer)
 
 # service httpd start
 
 
 REFERENCES
 1.http://apache.httpd.org/
 2.http://www.apacheweek.com/features/security-20
 3.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020
 4.http://www.digitaldefense.net/labs/papers/Termulation.txt
 5.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113
 6.http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174


UPDATED PACKAGES
ftp://atualizacoes.conectiva.com.br/8/RPMS/apache-1.3.28-1U80_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/apache-devel-1.3.28-1U80_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/RPMS/apache-doc-1.3.28-1U80_3cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/8/SRPMS/apache-1.3.28-1U80_3cl.src.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-devel-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-doc-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-htpasswd-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/libapr0-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/libapr-devel-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/libapr-devel-static-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/mod_auth_ldap-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/RPMS/mod_dav-2.0.45-28790U90_6cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/9/SRPMS/apache-2.0.45-28790U90_6cl.src.rpm


ADDITIONAL INSTRUCTIONS
 The apt tool can be used to perform RPM packages upgrades:

 - run:                 apt-get update
 - after that, execute: apt-get upgrade

 Detailed instructions regarding the use of apt and upgrade examples 
 can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en

- -------------------------------------------------------------------------
All packages are signed with Conectiva's GPG key. The key and instructions
on how to import it can be found at 
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can be
found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en

- -------------------------------------------------------------------------
All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en

- -------------------------------------------------------------------------
Copyright (c) 2004 Conectiva Inc.
http://www.conectiva.com

- -------------------------------------------------------------------------
subscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br
unsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQFAfEWq42jd0JmAcZARApjMAKDGaOt/LdmwRMrkryAylL6BXvpLzQCg6U4s
aYREPcqykop5dEphzZO0XsY=
=GWUz
-----END PGP SIGNATURE-----


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC