what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

idsa-053003.txt

idsa-053003.txt
Posted May 31, 2003
Authored by iDefense Labs | Site idefense.com

iDEFENSE Security Advisory 05.30.03: Passing an overly long string to the apr_psprintf() APR library function that is used by the Apache HTTP Server could cause an application to reference memory that should have already been returned to the heap allocation pool.

tags | advisory, web
SHA-256 | 8f14d25b16284066d16c7efda2e0561997eb563778e85bcaa8276dd562be3cf7

idsa-053003.txt

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

iDEFENSE Security Advisory 05.30.03:
http://www.idefense.com/advisory/05.30.03.txt
Apache Portable Runtime Denial of Service and Arbitrary Code
Execution Vulnerability
April 30, 2003

I. BACKGROUND

The Apache Software Foundation's HTTP Server Project is an effort to
develop and maintain an open-source web server for modern OS'
including Unix and Microsoft Corp.'s Windows. More information is
available at http://httpd.apache.org/ .

The Apache Portable Runtime (APR) provides a free library of C data
structures and routines, forming a system portability layer to as
many OS' as possible. More information is available at
http://apr.apache.org/ .

mod_dav is an open-source Apache module that provides Distributed
Authoring and Versioning (DAV) capabilities to the Apache HTTP
Server. More information is available at
http://www.webdav.org/mod_dav/ .

II. DESCRIPTION

Passing an overly long string to the apr_psprintf() APR library
function that is used by the Apache HTTP Server could cause an
application to reference memory that should have already been
returned to the heap allocation pool. Arbitrary code execution
remains a possibility but has not been substantiated at the time of
publication of this report. Considering the strict conditions
necessary for successful code execution, it would be feasible but
difficult to develop an exploit capable of functioning outside of a
lab environment.

III. ANALYSIS

The remote denial of service aspect of this vulnerability can be
exploited if a remote attacker is able to pass large strings to the
vulnerable function, as is the case in the mod_dav attack vector,
where a specially crafted XML object request of approximately 12250
bytes crashed HTTP Server running on a non-Windows OS; approximately
20000 characters crashed it on a Windows OS.

IV. DETECTION

Applications that rely on older versions of APR are vulnerable. A
list of such projects is available at
http://apr.apache.org/projects.html#open_source . Both the Windows
and Unix implementations of Apache HTTP Server 2.0.37 through 2.0.45
inclusive are vulnerable.

V. WORKAROUND

The following patch should mitigate this vulnerability:

- - --- srclib/apr/memory/unix/apr_pools.c 7 Mar 2003 12:12:43 -0000
1.195
+++ srclib/apr/memory/unix/apr_pools.c 8 May 2003 20:11:14 -0000
@@ -976,7 +976,7 @@

if (ps->got_a_new_node) {
active->next = ps->free;
- - - ps->free = node;
+ ps->free = active;
}

ps->got_a_new_node = 1;


VI. VENDOR FIX

Apache HTTP Server 2.0.46, which contains updates for APR, can be
downloaded at http://httpd.apache.org/download.cgi .

VII. CVE INFORMATION

The Mitre Corp.'s Common Vulnerabilities and Exposures (CVE) Project
has assigned the identification number CAN-2003-0245 to this issue.

VIII. DISCLOSURE TIMELINE

03/19/2003 Issue disclosed to iDEFENSE
04/08/2003 iDEFENSE Labs initial research complete
04/09/2003 security@apache.org contacted
04/09/2003 Response from Lars Eilebrecht and Bill Rowe of Apache
04/11/2003 Response from Ian Holsman of Apache
05/08/2003 Response from Mark Cox of Apache
05/08/2003 Initial Research and patch Submitted to
iDEFENSE by Joe Orton of Apache
05/09/2003 Apache patch verified by iDEFENSE Labs
05/12/2003 vendor-sec list notified
05/26/2003 iDEFENSE clients notified
05/30/2003 Coordinated Public Disclosure


Get paid for security research
http://www.idefense.com/contributor.html

Subscribe to iDEFENSE Advisories:
send email to listserv@idefense.com, subject line: "subscribe"


About iDEFENSE:

iDEFENSE is a global security intelligence company that proactively
monitors sources throughout the world — from technical
vulnerabilities and hacker profiling to the global spread of viruses
and other malicious code. Our security intelligence services provide
decision-makers, frontline security professionals and network
administrators with timely access to actionable intelligence
and decision support on cyber-related threats. For more information,
visit http://www.idefense.com .


-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0

iQA/AwUBPte/IPrkky7kqW5PEQKrCwCg1fwptDn+mt0feP0n6rpdUdnMtQIAoNlE
wry6xtyvKO3hS4trsrOnh/Dp
=PKD4
-----END PGP SIGNATURE-----


To stop receiving iDEFENSE Security Advisories, reply to this message and put "unsubscribe" in the subject.
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close