apache httpd meta-character escaping
8abe8b82f64372f42f0d6c975eb3992d8e9ef7deb0f82d4ba736db230886b3d6
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
FreeBSD-SA-96:02 Security Advisory
FreeBSD, Inc.
Topic: apache httpd meta-character escaping
Category: port
Module: apache
Announced: 1996-04-22
Affects: FreeBSD 2.0.5 and 2.1.0 ports/packages distributions
with apache http daemon installed an enabled
Corrected: 1996-04-21 ports source code
Source: Generic apache distribution bug
FreeBSD only: no
Reference: CERT Advisory CA-96.06.cgi_example_code
(warning: CERT's advisory is incomplete)
Patches: no patches available, see below for update
=============================================================================
I. Background
A bug was found in the apache daemon that may allow remote
users to obtain unauthorized access to a machine running
apache httpd.
II. Problem Description
Versions of the apache http daemon before release 1.05 do
not properly restrict shell meta-characters transmitted to
the daemon via form input (via GET or POST).
III. Impact
The problem could allow remote users to gain unauthorized access
to a system. This problem is only exploitable on systems where
the apache http daemon has been installed and is enabled.
The apache http daemon is not installed or enabled by default
but is a common package that many FreeBSD users may have chosen
to install.
IV. Solution(s)
The Apache Group released version 1.05 of the daemon which fixes
this vulnerability. The FreeBSD Project updated the ports and
packages system to use this new daemon.
Interested parties may obtain an updated pre-compiled FreeBSD
package from:
ftp://ftp.freebsd.org/pub/FreeBSD/packages-current/www/apache-1.0.5.tgz
and an updated "automatic port" from the directory hierarchy:
ftp://ftp.freebsd.org/pub/FreeBSD/ports-current/www/apache.tar.gz
V. Workaround
This vulnerability can only be eliminated by updating to a more recent
version of apache or by disabling apache httpd.
=============================================================================
FreeBSD, Inc.
Web Site: http://www.freebsd.org/
Confidential contacts: security-officer@freebsd.org
PGP Key: ftp://freebsd.org/pub/CERT/public_key.asc
Security notifications: security-notifications@freebsd.org
Security public discussion: security@freebsd.org
Notice: Any patches in this document may not apply cleanly due to
modifications caused by digital signature or mailer software.
Please reference the URL listed at the top of this document
for original copies of all patches if necessary.
=============================================================================
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBMaLAi1UuHi5z0oilAQHqiQP/VKL3RhyNc3jmYyH6ydteiQUQ1+t7boqr
304LP9g3ifq/cdxDwjbR4joiVjTNsqvOE1LQryI0qHq6nFPqGBsnHZI+thYGNYdI
rjKOMRPF2VbzFx0W7mdvnQLxfCcU8Ma3A0zlub5hhqvN2gg3RVTXNYnF2FHIFL77
cVdx+nVibo8=
=tNpA
-----END PGP SIGNATURE-----