Apache LD_LIBRARY_PATH Processing Lets Local Users Gain Elevated Privileges
SecurityTracker Alert ID: 1026932|
SecurityTracker URL: http://securitytracker.com/id/1026932
(Links to External Site)
Date: Apr 17 2012
User access via local system|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): 2.4.x prior to 2.4.2|
A vulnerability was reported in Apache. A local user can obtain elevated privileges on the target system.|
The system may not securely handle the LD_LIBRARY_PATH environment variable and may search the current working directory for DSOs. A local user may be able to exploit this to execute arbitrary code on the target system with the privileges of the web service user.
A local user can obtain elevated privileges on the target system.|
The vendor has issued a fix (2.4.2).|
The advisory will be available at:
Vendor URL: httpd.apache.org/ (Links to External Site)
Access control error|
|Underlying OS: Linux (Any), UNIX (Any), Windows (Any)|
This archive entry has one or more follow-up message(s) listed below.|
Source Message Contents
Subject: [ANNOUNCEMENT] Apache HTTP Server 2.4.2 Released|
Apache HTTP Server 2.4.2 Released
The Apache Software Foundation and the Apache HTTP Server Project
are pleased to announce the release of version 2.4.2 of the Apache
HTTP Server ("Apache"). This version of Apache is our 2nd GA
release of the new generation 2.4.x branch of Apache HTTPD and
represents fifteen years of innovation by the project, and is
recommended over all previous releases. This version of Apache is
principally a security and bug fix release, including the following
*) SECURITY: CVE-2012-0883 (cve.mitre.org)
envvars: Fix insecure handling of LD_LIBRARY_PATH that could
lead to the current working directory to be searched for DSOs.
Apache HTTP Server 2.4.2 is available for download from:
Apache 2.4 offers numerous enhancements, improvements, and performance
boosts over the 2.2 codebase. For an overview of new features
introduced since 2.4 please see:
Please see the CHANGES_2.4 file, linked from the download page, for a
full list of changes. A condensed list, CHANGES_2.4.2 includes only
those changes introduced since the prior 2.4 release. A summary of all
of the security vulnerabilities addressed in this and earlier releases
This release requires the Apache Portable Runtime (APR) version 1.4.x
and APR-Util version 1.4.x. The APR libraries must be upgraded for all
features of httpd to operate correctly.
This release builds on and extends the Apache 2.2 API. Modules written
for Apache 2.2 will need to be recompiled in order to run with Apache
2.4, and require minimal or no source code changes.
When upgrading or installing this version of Apache, please bear in mind
that if you intend to use Apache with one of the threaded MPMs (other
than the Prefork MPM), you must ensure that any modules you will be
using (and the libraries they depend on) are thread-safe.
NOTE to Windows users: AcceptFilter None has replaced Win32DisableAcceptEx
and the feature appears to have interoperability issues with mod_ssl.
Apache 2.4.2 may not yet be suitable for all Windows servers. There
is not yet a Windows binary distribution of httpd 2.4, but this is
expected to be remedied soon as various dependencies graduate from
beta to GA.