SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   Apache HTTPD Vendors:   Apache Software Foundation
(Slackware Issues Fix) Apache Web Server Socket Starvation Flaw May Let Remote Users Deny Service
SecurityTracker Alert ID:  1010149
SecurityTracker URL:  http://securitytracker.com/id/1010149
CVE Reference:   CVE-2004-0174   (Links to External Site)
Date:  May 13 2004
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.0.48 and prior versions; 1.3.29 and prior versions
Description:   A vulnerability was reported in the Apache web server. A remote user may be able to cause denial of service conditions.

It is reported that a remote user can establish a short-lived connection to a rarely-accessed listening socket on the target server. This may cause the Apache child process to block new connections until another connection arrives on the rarely-accessed listening socket.

The report indicates that some versions of AIX, Solaris, and Tru64 UNIX are affected, but that FreeBSD and Linux systems are not affected.

Impact:   A remote user may be able to cause the target server to deny connection requests.
Solution:   Slackware has released a fix.

Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/apache-1.3.29-i386-2.tgz

Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/apache-1.3.29-i386-2.tgz

Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/apache-1.3.29-i486-2.tgz

Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/apache-1.3.31-i486-1.tgz
(these related packages are also available)
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/mod_ssl-2.8.17_1.3.31-i486-2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/php-4.3.6-i486-2.tgz

The MD5 signatures are:

Slackware 8.1 package:
53949a74ba3dd0a01271e3aa1178e082 apache-1.3.29-i386-2.tgz

Slackware 9.0 package:
64ede1f5637736842502301eb5bd727d apache-1.3.29-i386-2.tgz

Slackware 9.1 package:
ec5dad948d8b17b82b91d756a5c6b0f9 apache-1.3.29-i486-2.tgz

Slackware -current packages:
a925f8be7b8bbcb7e4a77e2ef755988a apache-1.3.31-i486-1.tgz
684626575e1c2a783b3d8d208876aab4 mod_ssl-2.8.17_1.3.31-i486-2.tgz
ad27d5f96281e11567184411b7c0720e php-4.3.6-i486-2.tgz

Vendor URL:  httpd.apache.org/ (Links to External Site)
Cause:   Resource error
Underlying OS:  Linux (Slackware)
Underlying OS Comments:  8.1, 9.0, 9.1, and -current

Message History:   This archive entry is a follow-up to the message listed below.
Mar 19 2004 Apache Web Server Socket Starvation Flaw May Let Remote Users Deny Service



 Source Message Contents

Subject:  [slackware-security] apache (SSA:2004-133-01)



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  apache (SSA:2004-133-01)

New apache packages are available for Slackware 8.1, 9.0, 9.1, and -current to
fix security issues.  These include a possible denial-of-service attack as well
as the ability to possible pipe shell escapes through Apache's errorlog (which
could create an exploit if the error log is read in a terminal program that
does not filter such escapes).  We recommend that sites running Apache upgrade
to the new Apache package.

More details about these issues may be found in the Common
Vulnerabilities and Exposures (CVE) database:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0993


Here are the details from the Slackware 9.1 ChangeLog:
+--------------------------+
Wed May 12 13:06:39 PDT 2004
patches/packages/apache-1.3.29-i486-2.tgz:  Patched four security issues
  in the Apache web server as noted on http://httpd.apache.org.
  These security fixes were backported from Apache 1.3.31:

    In mod_digest, verify whether the nonce returned in the client
    response is one we issued ourselves.  This problem does not affect
    mod_auth_digest. (CAN-2003-0987)

    Escape arbitrary data before writing into the errorlog.  (CAN-2003-0020)

    Fix starvation issue on listening sockets where a short-lived connection
    on a rarely-accessed listening socket will cause a child to hold the
    accept mutex and block out new connections until another connection
    arrives on that rarely-accessed listening socket.  (CAN-2004-0174)

    Fix parsing of Allow/Deny rules using IP addresses without a netmask;
    issue is only known to affect big-endian 64-bit platforms (CAN-2003-0993)

  For more details, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0987
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0993

  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Updated package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/apache-1.3.29-i386-2.tgz

Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackware/slackware-9.0/patches/packages/apache-1.3.29-i386-2.tgz

Updated package for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackware/slackware-9.1/patches/packages/apache-1.3.29-i486-2.tgz

Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/apache-1.3.31-i486-1.tgz
(these related packages are also available)
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/mod_ssl-2.8.17_1.3.31-i486-2.tgz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/php-4.3.6-i486-2.tgz


MD5 signatures:
+-------------+

Slackware 8.1 package:
53949a74ba3dd0a01271e3aa1178e082  apache-1.3.29-i386-2.tgz

Slackware 9.0 package:
64ede1f5637736842502301eb5bd727d  apache-1.3.29-i386-2.tgz

Slackware 9.1 package:
ec5dad948d8b17b82b91d756a5c6b0f9  apache-1.3.29-i486-2.tgz

Slackware -current packages:
a925f8be7b8bbcb7e4a77e2ef755988a  apache-1.3.31-i486-1.tgz
684626575e1c2a783b3d8d208876aab4  mod_ssl-2.8.17_1.3.31-i486-2.tgz
ad27d5f96281e11567184411b7c0720e  php-4.3.6-i486-2.tgz


Installation instructions:
+------------------------+

First, stop apache:

# apachectl stop

Next, upgrade the Apache package as root:
(if you're running -current, upgrade mod_ssl and php as well)

# upgradepkg apache-1.3.29-i486-2.tgz

Finally, restart apache:

# apachectl start

Or, if you're running a secure server with mod_ssl:

# apachectl startssl


+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com

+------------------------------------------------------------------------+
| To leave the slackware-security mailing list:                          |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message:                                                     |
|                                                                        |
|   unsubscribe slackware-security                                       |
|                                                                        |
| You will get a confirmation message back containing instructions to    |
| complete the process.  Please do not reply to this email address.      |
+------------------------------------------------------------------------+

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFAoq6BakRjwEAQIjMRArVdAKCUpK0yrttsmaiaxkwnyCMSMpjdygCdHgaK
WuRejVuF9XzjATed+VRlBYw=
=+cB4
-----END PGP SIGNATURE-----

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC