exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

sa96-02

sa96-02
Posted Sep 23, 1999

apache httpd meta-character escaping

systems | freebsd
SHA-256 | 8abe8b82f64372f42f0d6c975eb3992d8e9ef7deb0f82d4ba736db230886b3d6

sa96-02

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

=============================================================================
FreeBSD-SA-96:02 Security Advisory
FreeBSD, Inc.

Topic: apache httpd meta-character escaping

Category: port
Module: apache
Announced: 1996-04-22
Affects: FreeBSD 2.0.5 and 2.1.0 ports/packages distributions
with apache http daemon installed an enabled
Corrected: 1996-04-21 ports source code
Source: Generic apache distribution bug
FreeBSD only: no

Reference: CERT Advisory CA-96.06.cgi_example_code
(warning: CERT's advisory is incomplete)

Patches: no patches available, see below for update

=============================================================================

I. Background

A bug was found in the apache daemon that may allow remote
users to obtain unauthorized access to a machine running
apache httpd.


II. Problem Description

Versions of the apache http daemon before release 1.05 do
not properly restrict shell meta-characters transmitted to
the daemon via form input (via GET or POST).


III. Impact

The problem could allow remote users to gain unauthorized access
to a system. This problem is only exploitable on systems where
the apache http daemon has been installed and is enabled.

The apache http daemon is not installed or enabled by default
but is a common package that many FreeBSD users may have chosen
to install.

IV. Solution(s)

The Apache Group released version 1.05 of the daemon which fixes
this vulnerability. The FreeBSD Project updated the ports and
packages system to use this new daemon.

Interested parties may obtain an updated pre-compiled FreeBSD
package from:

ftp://ftp.freebsd.org/pub/FreeBSD/packages-current/www/apache-1.0.5.tgz

and an updated "automatic port" from the directory hierarchy:

ftp://ftp.freebsd.org/pub/FreeBSD/ports-current/www/apache.tar.gz

V. Workaround

This vulnerability can only be eliminated by updating to a more recent
version of apache or by disabling apache httpd.


=============================================================================
FreeBSD, Inc.

Web Site: http://www.freebsd.org/
Confidential contacts: security-officer@freebsd.org
PGP Key: ftp://freebsd.org/pub/CERT/public_key.asc
Security notifications: security-notifications@freebsd.org
Security public discussion: security@freebsd.org

Notice: Any patches in this document may not apply cleanly due to
modifications caused by digital signature or mailer software.
Please reference the URL listed at the top of this document
for original copies of all patches if necessary.
=============================================================================

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMaLAi1UuHi5z0oilAQHqiQP/VKL3RhyNc3jmYyH6ydteiQUQ1+t7boqr
304LP9g3ifq/cdxDwjbR4joiVjTNsqvOE1LQryI0qHq6nFPqGBsnHZI+thYGNYdI
rjKOMRPF2VbzFx0W7mdvnQLxfCcU8Ma3A0zlub5hhqvN2gg3RVTXNYnF2FHIFL77
cVdx+nVibo8=
=tNpA
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close