SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   Compaq Secure Web Server Vendors:   Modssl.org
(HP Issues Fix for CSWS) Apache mod_ssl Stack Overflow in ssl_util_uuencode_binary() May Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1011675
SecurityTracker URL:  http://securitytracker.com/id/1011675
CVE Reference:   CVE-2004-0488   (Links to External Site)
Date:  Oct 14 2004
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.2, 1.3, 2.0
Description:   A buffer overflow vulnerability was reported in Apache mod_ssl. A remote user may be able to execute arbitrary code on the target system in certain situations.

Georgi Guninski reported that the ssl_util_uuencode_binary() function in 'ssl_util.c' may allow a remote user to supply a specially crafted Subject-DN in a client certificate to trigger the overflow. According to OpenPKG, the overflow resides in the "SSLOptions +FakeBasicAuth" implementation of mod_ssl and can be triggered if the Subject-DN is longer than 6 KB and mod_ssl is configured to trust the certificate's issuing CA.

Impact:   A remote user may be able to execute arbitrary code on the target system in certain cases.
Solution:   HP has issued patch kits, available at:

http://h71000.www7.hp.com/openvms/products/ips/apache/csws_patches.html

For CSWS Version 2.0:

CPQ-AXPVMS-CSWS20_UPDATE-V0100--4.PCSI_SFX_AXPEXE (CSWS 2.0 Update 1)
with
CSWS20_UPDATE-V0100_README.TXT (September 2004)

For CSWS Version 1.3:

CPQ-AXPVMS-CSWS13_UPDATE-V0600--4.PCSI-DCX-AXPEXE (CSWS 1.3 Update 6)
with
CSWS13_UPDATE-V0600_README.TXT (September 2004)

For CSWS Version 1.2:

CPQ-AXPVMS-CSWS12_UPDATE-V0800--4.PCSI-DCX-AXPEXE (CSWS 1.2 Update 8)
with
CSWS12_UPDATE-V0800_README.TXT (September 2004)

For CSWS_PHP Version 1.2:

CPQ-AXPVMS-CSWS_PHP12_UPDATE-V0100--4.PCSI_SFX_AXPEXE (CSWS_PHP 1.2 Update 1)

Vendor URL:  www.hp.com/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  OpenVMS
Underlying OS Comments:  7.2-2 or later

Message History:   This archive entry is a follow-up to the message listed below.
May 28 2004 Apache mod_ssl Stack Overflow in ssl_util_uuencode_binary() May Let Remote Users Execute Arbitrary Code



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC