what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

NISCC Security Advisory 403518

NISCC Security Advisory 403518
Posted Sep 15, 2004
Authored by CPNI | Site uniras.gov.uk

NISCC Vulnerability Advisory 403518/NISCC/APACHE - Two new vulnerabilities have been discovered in Apache. Through the testing of Apache by using the Codenomicon HTTP Test Tool, the ASF Security Team has discovered a bug in the apr-util library, which can lead to arbitrary code execution. SITIC have discovered that Apache suffers from a buffer overflow when expanding environment variables in configuration files such as .htaccess and httpd.conf, leading to possible privilege escalation. These vulnerabilities affect versions 2.0.35 through 2.0.50.

tags | advisory, web, overflow, arbitrary, vulnerability, code execution
advisories | CVE-2004-0786, CVE-2004-0747
SHA-256 | 819928722d2c3ee7a440437b80c12521e6cbd9bd15899e997ed85366e5c80461

NISCC Security Advisory 403518

Change Mirror Download
<html>

<head>
<title>NISCC Vulnerability Advisory 403518</title>
</head>

<body bgcolor="#FFFFCC" lang=EN-GB link=blue vlink=blue style='tab-interval:
36.0pt'>

<div class=Section1>

<div>


<p class=MsoNormal style='margin-bottom:12.0pt'><span style='font-family:Verdana'><br>
</span><b><span style='font-size:13.5pt;font-family:Verdana;color:red'>NISCC
Vulnerability Advisory 403518/NISCC/APACHE</span></b><span style='font-size:
13.5pt;font-family:Verdana'><br>
<br>
<b>Vulnerability Issues with the Apache Web Server</b></span><span
style='font-family:Verdana'><br>
<br>
<br>
<b>Version Information</b> <o:p></o:p></span></p>

<table class=MsoNormalTable border=1 cellpadding=0 width="61%"
style='width:61.0%;mso-cellspacing:1.5pt;mso-padding-alt:0cm 5.4pt 0cm 5.4pt'>
<tr style='mso-yfti-irow:0'>
<td width="58%" style='width:58.0%;padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-family:Verdana'>Advisory Reference<o:p></o:p></span></p>
</td>
<td width="77%" style='width:77.0%;padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-family:Verdana'>403518/NISCC/APACHE<o:p></o:p></span></p>
</td>
</tr>
<tr style='mso-yfti-irow:1'>
<td width="58%" style='width:58.0%;padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-family:Verdana'>Release Date<o:p></o:p></span></p>
</td>
<td width="77%" style='width:77.0%;padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-family:Verdana'>15 September 2004<o:p></o:p></span></p>
</td>
</tr>
<tr style='mso-yfti-irow:2'>
<td width="58%" style='width:58.0%;padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-family:Verdana'>Last Revision<o:p></o:p></span></p>
</td>
<td width="77%" style='width:77.0%;padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style="font-family: Verdana">15</span><st1:date Year="2004" Day="6" Month="9"><span
style='font-family:Verdana'> September 2004</span></st1:date><span
style='font-family:Verdana'><o:p></o:p></span></p>
</td>
</tr>
<tr style='mso-yfti-irow:3;mso-yfti-lastrow:yes'>
<td width="58%" style='width:58.0%;padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-family:Verdana'>Version Number<o:p></o:p></span></p>
</td>
<td width="77%" style='width:77.0%;padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-family:Verdana'>1.0<o:p></o:p></span></p>
</td>
</tr>
</table>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>&nbsp
<br>
<b>What is Affected?<o:p></o:p></b></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>
The vulnerabilities described in this advisory affects the Apache 2.0.x web server
software (please note that all versions of Apache 1.3.x are unaffected).<o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>
<br>
<b>Severity</b><br>
<br>
The severity of the vulnerabilities varies by vendor; however if exploited, the
vulnerabilities could allow an attacker to execute arbitrary code on the
systems or lead to possible privilege escalation. <br>
<br>
<br>
<b>Summary</b><br>
<br>
Two vulnerabilities have been discovered within the Apache 2.0.x web server by
two separate research parties; one by the </span><font face="Verdana">Apache
Software Foundation and Red Hat Security teams</font><span style='font-family:Verdana'>, using the
HTTP Test Tool supplied by Codenomicon and one by the Swedish IT Incident
Centre within the National Post and Telecom Agency (SITIC).<o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>Apache
is the most popular web server on the Internet since April of 1996 and is
available on both UNIX and Windows platforms. The two vulnerabilities that were
identified are as follows:<o:p></o:p></span></p>

<ul>
<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>1.
Through the testing of Apache by using the Codenomicon HTTP Test Tool, the ASF
Security Team has discovered a bug in the apr-util library, which can lead to
arbitrary code execution.<o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>2.
SITIC have discovered that Apache suffers from a buffer overflow when expanding
environment variables in configuration files such as .htaccess and httpd.conf,
leading to possible privilege escalation. <o:p></o:p></span></p>
</ul>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>All
users of Apache that are affected by these vulnerabilities are recommended to
take note of this advisory and carry out any remedial actions suggested by
their vendor(s).<o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><br>
<b><span style='font-family:Verdana'>Details</span></b><br>
<br>
<span style='font-family:Verdana'>Apache is maintained by the Apache Project,
which is a collaborative software development effort. The project is jointly
managed by a group of volunteers located around the world, using the Internet
and the Web to communicate, plan, and develop the server and its related
documentation. These volunteers are known as the Apache Group.</span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>Vendor
specific information will be released as it becomes available and if vendor permission
has been received. Subscribers are advised to check the following URL regularly
for updates: <br>
<br>
<a href="http://www.uniras.gov.uk/vuls/2004/403518/index.htm">http://www.uniras.gov.uk/vuls/2004/403518/index.htm</a><br>
<br>
<i>[Please note that updates to this advisory will not be notified by email.]</i>
<o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><i><span style='font-family:Verdana'>Vulnerability
1:</span></i><span style='font-family:Verdana'> <o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>The
identified vulnerability is in the apr-util library; the apr_uri_parse function
in the apr-util library lacks input validation on IPv6 literal addresses, which
can result in a negative length parameter being passed to memcpy. By carefully
crafting URLs that includes IPv6 literal addresses in the Request-URI or Host
header, it could be possible to use these URLs to trigger the problem via
httpd.<o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>Although
with most platforms this vulnerability will not lead to arbitrary code
execution, it is possible to exploit it under the following circumstances:<o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>On
BSD distributions it may be exploitable because the implementation of memcpy
will write three arbitrary bytes to an attacker controlled location; however
this will not be trivial.<o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>It
may be exploitable on any platform if the optional (and not default)
AP_ENABLE_EXCEPTION_HOOK define is enabled. This is used for example by the
experimental "mod_whatkilledus" module.<o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>This
vulnerability has been assigned the <a href="http://cve.mitre.org/cve">CVE</a>
name <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0786">CAN-2004-0786</a>.
<o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><i><span style='font-family:Verdana'>Vulnerability
2:</span></i><span style='font-family:Verdana'> <o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>The
buffer overflow occurs when expanding ${ENVVAR} constructs in .htaccess or
httpd.conf files. The function ap_resolve_env() in server/util.c copies data
from the environment variables to the character array tmp with strcat(3),
leading to a buffer overflow and hence possible privilege escalation.<o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>HTTP
requests that exploit this problem are not shown in the access log, although
the error log will show Segmentation faults. <o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>However
for this vulnerability to be exploited, an attacker must first induce a normal
user to install the malicious configuration files onto their servers before an
exploit can take place. <o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>This
vulnerability has been assigned the <a href="http://cve.mitre.org/cve">CVE</a>
name <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747">CAN-2004-0747</a>.<o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><span
style='mso-spacerun:yes'> </span><span style='font-family:Verdana'>
<br>
<b>Mitigation</b><br>
<br>
Patch all affected implementations.<o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>
<br>
<b>Solution</b><br>
<br>
For Apache 2.0.* there is an official fix available for both issues. Also fixes
for both issues will be incorporated into Apache 2.0.51.<o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>However
platform vendors may issue their own patches, hence please also refer to the
Vendor Information section of this advisory for platform specific remediation.<o:p></o:p></span></p>

<p class=MsoNormal><span style='font-family:Verdana'>
<br>
<b>Vendor Information<o:p></o:p></b></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'><br>
The following vendors have provided information about how their products are
affected by these vulnerabilities.<br>
<br>
</span><i><span style='font-size:10.0pt;font-family:Verdana'>Please note that <a
href="http://www.jpcert.or.jp">JPCERT/CC</a> have released a Japanese language
advisory for this vulnerability which contains additional information regarding
Japanese vendors. This advisory is available at <a
href="http://jvn.jp/niscc/NISCC-403518.html">http://jvn.jp/niscc/NISCC-403518.html</a>.</span></i><span
style='font-family:Verdana'> <o:p></o:p></span></p>

<table class=MsoNormalTable border=0 cellspacing=0 cellpadding=0 width="100%"
style='width:100.0%;border-collapse:collapse;mso-padding-alt:0cm 0cm 0cm 0cm'>
<tr style='mso-yfti-irow:0'>
<td width="33%" style='width:33.0%;padding:0cm 0cm 0cm 0cm'>
<p class=MsoNormal><font face="Verdana" size="2"><a href="#apache">Apache
Software Foundation</a></font></p>
</td>
<td width="33%" style='width:33.0%;padding:0cm 0cm 0cm 0cm'>
<p class=MsoNormal><span style='font-family:Verdana'><o:p>&nbsp;</o:p></span></p>
</td>
<td width="34%" style='width:34.0%;padding:0cm 0cm 0cm 0cm'>
<p class=MsoNormal><span style='font-family:Verdana'><o:p>&nbsp;</o:p></span></p>
</td>
</tr>
<tr style='mso-yfti-irow:1'>
<td width="33%" style='width:33.0%;padding:0cm 0cm 0cm 0cm'>
<p class=MsoNormal><span style='font-size:10.0pt;font-family:Verdana'><a
href="#cisco">Cisco</a></span><span style='font-family:Verdana'><o:p></o:p></span></p>
</td>
<td width="33%" style='width:33.0%;padding:0cm 0cm 0cm 0cm'>
<p class=MsoNormal><span style='font-family:Verdana'><o:p>&nbsp;</o:p></span></p>
</td>
<td width="34%" style='width:34.0%;padding:0cm 0cm 0cm 0cm'>
<p class=MsoNormal><span style='font-family:Verdana'><o:p>&nbsp;</o:p></span></p>
</td>
</tr>
<tr style='mso-yfti-irow:2;mso-yfti-lastrow:yes'>
<td width="33%" style='width:33.0%;padding:0cm 0cm 0cm 0cm'>
<p class=MsoNormal><font face="Verdana" size="2"><a href="#fujitsu">Fujitsu</a></font></p>
</td>
<td width="33%" style='width:33.0%;padding:0cm 0cm 0cm 0cm'>
<p class=MsoNormal><span style='font-family:Verdana'><o:p>&nbsp;</o:p></span></p>
</td>
<td width="34%" style='width:34.0%;padding:0cm 0cm 0cm 0cm'>
<p class=MsoNormal><span style='font-family:Verdana'><o:p>&nbsp;</o:p></span></p>
</td>
</tr>
<tr style='mso-yfti-irow:2;mso-yfti-lastrow:yes'>
<td width="33%" style='width:33.0%;padding:0cm 0cm 0cm 0cm'>
<font size="2"><span style="font-family: Verdana"><a href="#hitachi">Hitachi</a></span></font></td>
<td width="33%" style='width:33.0%;padding:0cm 0cm 0cm 0cm'>
&nbsp;</td>
<td width="34%" style='width:34.0%;padding:0cm 0cm 0cm 0cm'>
&nbsp;</td>
</tr>
<tr style='mso-yfti-irow:2;mso-yfti-lastrow:yes'>
<td width="33%" style='width:33.0%;padding:0cm 0cm 0cm 0cm'>
<span style='font-size:10.0pt;font-family:Verdana'><a
href="#juniper">Juniper Networks</a></span><span style='font-family:Verdana'><o:p></o:p></span></td>
<td width="33%" style='width:33.0%;padding:0cm 0cm 0cm 0cm'>
&nbsp;</td>
<td width="34%" style='width:34.0%;padding:0cm 0cm 0cm 0cm'>
&nbsp;</td>
</tr>
<tr style='mso-yfti-irow:2;mso-yfti-lastrow:yes'>
<td width="33%" style='width:33.0%;padding:0cm 0cm 0cm 0cm'>
<span style='font-size:10.0pt;font-family:Verdana'><a
href="#oracle">Oracle</a></span><span style='font-family:Verdana'><o:p></o:p></span></td>
<td width="33%" style='width:33.0%;padding:0cm 0cm 0cm 0cm'>
&nbsp;</td>
<td width="34%" style='width:34.0%;padding:0cm 0cm 0cm 0cm'>
&nbsp;</td>
</tr>
<tr style='mso-yfti-irow:2;mso-yfti-lastrow:yes'>
<td width="33%" style='width:33.0%;padding:0cm 0cm 0cm 0cm'>
<font size="2"><span style="font-family: Verdana"><a href="#redhat">Red Hat</a></span></font></td>
<td width="33%" style='width:33.0%;padding:0cm 0cm 0cm 0cm'>
&nbsp;</td>
<td width="34%" style='width:34.0%;padding:0cm 0cm 0cm 0cm'>
&nbsp;</td>
</tr>
<tr style='mso-yfti-irow:2;mso-yfti-lastrow:yes'>
<td width="33%" style='width:33.0%;padding:0cm 0cm 0cm 0cm'>
<font size="2"><span style="font-family: Verdana"><a href="#suse">SUSE LINUX</a></span></font></td>
<td width="33%" style='width:33.0%;padding:0cm 0cm 0cm 0cm'>
&nbsp;</td>
<td width="34%" style='width:34.0%;padding:0cm 0cm 0cm 0cm'>
&nbsp;</td>
</tr>
</table>
<br>
<br>
<table class=MsoNormalTable border=0 cellspacing=0 cellpadding=0 width="100%"
style='width:100.0%;mso-cellspacing:0cm;mso-padding-alt:6.0pt 6.0pt 6.0pt 6.0pt'>
<tr>
<td width=846 colspan=2 style='width:634.5pt;background:#FFFFAF;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:13.5pt'>
<p class=MsoNormal><a name=apache></a><u><span style="font-family: Verdana">Apache
Software Foundation</span></u></p>
</td>
</tr>
<tr>
<td width="3%" style='width:3.0%;background:#FFFFAF;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:64.1pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="97%" style='width:97.0%;background:#FFFFAF;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:64.1pt'>
<font face="Verdana">These issues will be addressed in an upcoming release of
the Apache HTTP Server, expected to be version 2.0.51. Individual patches for
these issues are also available from:</font><p>
<font face="Verdana">&nbsp;<a HREF="http://www.apache.org/dist/httpd/patches/apply_to_2.0.50/">http://www.apache.org/dist/httpd/patches/apply_to_2.0.50/</a>.</font></td>
</tr>
<tr>
<td width=846 colspan=2 style='width:634.5pt;background:#FFFFBE;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:13.5pt'>
<p class=MsoNormal><a name=cisco></a><u><span style='font-family:Verdana'>Cisco</span></u><span
style='font-family:Verdana'><o:p></o:p></span></p>
</td>
</tr>
<tr>
<td width="3%" style='width:3.0%;background:#FFFFBE;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:78.85pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="97%" style='width:97.0%;background:#FFFFBE;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:78.85pt'>
<p class=MsoNormal><span style='font-family:Verdana;mso-bidi-font-family:
"Courier New"'>Cisco Systems is evaluating the vulnerabilities identified by NISCC
#403518. Should an issue be found, Cisco will release a Security Advisory.
The most up-to-date information on all Cisco product security issues may be
found at:<o:p></o:p></span></p>
<p class=MsoNormal><span style='font-family:Verdana;mso-bidi-font-family:
"Courier New"'><a href="http://www.cisco.com/go/psirt/">http://www.cisco.com/go/psirt/</a><o:p></o:p></span></p>
</td>
</tr>
<tr>
<td width=846 colspan=2 style='width:634.5pt;background:#FFFFAF;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:13.5pt'>
<p class=MsoNormal><a name=fujitsu></a><u><span style="font-family: Verdana">
Fujitsu</span></u></p>
</td>
</tr>
<tr>
<td width="3%" style='width:3.0%;background:#FFFFAF;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:64.1pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="97%" style='width:97.0%;background:#FFFFAF;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:64.1pt'>
<p class=MsoNormal><span style='font-family:Verdana;mso-bidi-font-family:
"Courier New"'>Not vulnerable (still under examination).</span><span style="font-family: Verdana">&nbsp; For further information
please see:</span></p>
<p class=MsoNormal><span style="font-family: Verdana"><a href="http://software.fujitsu.com/jp/security/niscc/niscc.html#403518-Apache">http://software.fujitsu.com/jp/security/niscc/niscc.html#403518-Apache</a>.</span></p>
</td>
</tr>
<tr>
<td width=846 colspan=2 style='width:634.5pt;background:#FFFFBE;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:13.5pt'>
<p class=MsoNormal><a name=hitachi></a><u><span style="font-family: Verdana">
Hitachi</span></u></p>
</td>
</tr>
<tr>
<td width="3%" style='width:3.0%;background:#FFFFBE;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:78.85pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="97%" style='width:97.0%;background:#FFFFBE;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:78.85pt'>
<p class="MsoNormal"><span style="font-family: Verdana">Hitachi products are
NOT affected by this issue.</span></td>
</tr>
<tr style='mso-yfti-irow:2;height:13.5pt'>
<td width=846 colspan=2 style='width:634.5pt;background:#FFFFAF;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:13.5pt'>
<p class=MsoNormal><a name=juniper></a><u><span style='font-family:Verdana'>Juniper</span></u><span
style='font-family:Verdana'><o:p></o:p></span></p>
</td>
</tr>
<tr style='mso-yfti-irow:3;height:64.1pt'>
<td width="3%" style='width:3.0%;background:#FFFFAF;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:64.1pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="97%" style='width:97.0%;background:#FFFFAF;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:64.1pt'>
<p class=MsoNormal><span style='font-family:Verdana;mso-bidi-font-family:
"Courier New"'>Juniper Networks products are not susceptible to this
vulnerability.</span></p>
</td>
</tr>
<tr style='mso-yfti-irow:4;height:13.5pt'>
<td width=846 colspan=2 style='width:634.5pt;background:#FFFFBE;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:13.5pt'>
<p class=MsoNormal><a name=oracle></a><u><span style='font-family:Verdana'>Oracle</span></u><span
style='font-family:Verdana'><o:p></o:p></span></p>
</td>
</tr>
<tr style='mso-yfti-irow:5;mso-yfti-lastrow:yes;height:78.85pt'>
<td width="3%" style='width:3.0%;background:#FFFFBE;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:78.85pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="97%" style='width:97.0%;background:#FFFFBE;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:78.85pt'>
<p class=MsoNormal><span style='font-family:Verdana'>Source:<br>
Oracle Corporation<br>
Oracle Security Alerts</span><span style='font-family:Verdana'><o:p></o:p></span></p>
<p class=MsoNormal><span style='font-family:Verdana;mso-bidi-font-family:
"Courier New"'>Oracle is not vulnerable to this vulnerability.<o:p>&nbsp;</o:p></span></p>
</td>
</tr>
<tr>
<td width=846 colspan=2 style='width:634.5pt;background:#FFFFAF;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:13.5pt'>
<p class=MsoNormal><a name=redhat></a><u><span style="font-family: Verdana">
Red Hat</span></u></p>
</td>
</tr>
<tr>
<td width="3%" style='width:3.0%;background:#FFFFAF;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:64.1pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="97%" style='width:97.0%;background:#FFFFAF;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:64.1pt'>
<font face="Verdana">Red Hat Enterprise Linux 3 contains a httpd package which
is vulnerable to these issues. As these issues only cause an Apache child
process to crash, for the default processing model these issues do not
constitute a denial of service. New httpd packages will be available along
with our advisory at the URL below or by using the Red Hat Network 'up2date'
tool.</font><font SIZE="2"><p></p>
<p></font><a HREF="http://rhn.redhat.com/errata/RHSA-2004-463.html">
<font COLOR="#0000ff" face="Verdana"><u>
http://rhn.redhat.com/errata/RHSA-2004-463.html</u></font></a></td>
</tr>
<tr>
<td width=846 colspan=2 style='width:634.5pt;background:#FFFFBE;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:13.5pt'>
<p class=MsoNormal><a name=suse></a><u><span style="font-family: Verdana">
SUSE LINUX</span></u></p>
</td>
</tr>
<tr>
<td width="3%" style='width:3.0%;background:#FFFFBE;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:78.85pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="97%" style='width:97.0%;background:#FFFFBE;padding:6.0pt 6.0pt 6.0pt 6.0pt;
height:78.85pt'>
<font face="Verdana">SUSE LINUX will release updates to Apache at the
following URL:</font><p><font face="Verdana">
<a HREF="http://www.suse.de/en/private/download/updates/">
<font COLOR="#0000ff"><u>http://www.suse.de/en/private/download/updates/</u></font></a></font></td>
</tr>
</table>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'><br>
<b>Acknowledgements</b><br>
<br>
NISCC wishes to thank the following:<o:p></o:p></span></p>

<table class=MsoNormalTable border=0 cellspacing=0 cellpadding=0 width="100%"
style='width:100.0%;border-collapse:collapse;mso-padding-alt:4.5pt 4.5pt 4.5pt 4.5pt'
id=AutoNumber3>
<tr style='mso-yfti-irow:0'>
<td width="3%" valign=top style='width:3.0%;padding:4.5pt 4.5pt 4.5pt 4.5pt'>
<p class=MsoNormal><span style='font-family:Verdana'>• <o:p></o:p></span></p>
</td>
<td width="197%" style='width:197.0%;padding:4.5pt 4.5pt 4.5pt 4.5pt'>
<p class=MsoNormal><font face="Verdana">The Apache Software Foundation and Red
Hat Security Teams</font><span style='font-family:Verdana'> for their
contributions to this advisory.<o:p></o:p></span></p>
</td>
</tr>
<tr style='mso-yfti-irow:1'>
<td width="3%" valign=top style='width:3.0%;padding:4.5pt 4.5pt 4.5pt 4.5pt'>
<p class=MsoNormal><span style='font-family:Verdana'>• <o:p></o:p></span></p>
</td>
<td width="197%" style='width:197.0%;padding:4.5pt 4.5pt 4.5pt 4.5pt'>
<p class=MsoNormal><span style='font-family:Verdana'>The Swedish IT Incident
Centre for their contributions to this advisory.<o:p></o:p></span></p>
</td>
</tr>
<tr style='mso-yfti-irow:2;mso-yfti-lastrow:yes'>
<td width="3%" valign=top style='width:3.0%;padding:4.5pt 4.5pt 4.5pt 4.5pt'>
<p class=MsoNormal><span style='font-family:Verdana'>• <o:p></o:p></span></p>
</td>
<td width="197%" style='width:197.0%;padding:4.5pt 4.5pt 4.5pt 4.5pt'>
<p class=MsoNormal><span style='font-family:Verdana'>JPCERT/CC for their assistance
in co-ordinating this disclosure in </span><st1:country-region><st1:place><span
style='font-family:Verdana'>Japan</span></st1:place></st1:country-region><span
style='font-family:Verdana'>.<o:p></o:p></span></p>
</td>
</tr>
</table>

<p class=MsoNormal><span style='font-family:Verdana'>
<br>
<b>References</b> <o:p></o:p></span></p>

<table class=MsoNormalTable border=0 cellspacing=0 cellpadding=0 width="100%"
style='width:100.0%;border-collapse:collapse;mso-padding-alt:3.0pt 3.0pt 3.0pt 3.0pt'
id=AutoNumber7>
<tr style='mso-yfti-irow:0'>
<td width="2%" style='width:2.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="98%" colspan=3 style='width:98.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><b><span style='font-family:Verdana'>Apache Links</span></b><span
style='font-family:Verdana'><o:p></o:p></span></p>
</td>
</tr>
<tr style='mso-yfti-irow:1'>
<td width="2%" style='width:2.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="2%" style='width:2.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="96%" colspan=2 style='width:96.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><span style='font-family:Verdana'>The Apache Software
Foundation<o:p></o:p></span></p>
</td>
</tr>
<tr style='mso-yfti-irow:2'>
<td width="2%" style='width:2.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="2%" style='width:2.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="2%" style='width:2.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="94%" style='width:94.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><span style='font-family:Verdana'><a
href="http://www.apache.org/">http://www.apache.org/</a><o:p></o:p></span></p>
</td>
</tr>
<tr style='mso-yfti-irow:3'>
<td width="2%" style='width:2.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="98%" colspan=3 style='width:98.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><b><span style='font-family:Verdana'>Vulnerability
Databases</span></b><span style='font-family:Verdana'><o:p></o:p></span></p>
</td>
</tr>
<tr style='mso-yfti-irow:4'>
<td width="2%" style='width:2.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="2%" style='width:2.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="96%" colspan=2 style='width:96.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><span style='font-family:Verdana'>Common Vulnerabilities
and Exposures (CVE)<o:p></o:p></span></p>
</td>
</tr>
<tr style='mso-yfti-irow:5'>
<td width="2%" style='width:2.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="2%" style='width:2.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="2%" style='width:2.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="94%" style='width:94.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><span style='font-family:Verdana'><a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0786">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0786</a><o:p></o:p></span></p>
</td>
</tr>
<tr style='mso-yfti-irow:6;mso-yfti-lastrow:yes'>
<td width="2%" style='width:2.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="2%" style='width:2.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="2%" style='width:2.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><span style='font-family:Verdana'>&nbsp;<o:p></o:p></span></p>
</td>
<td width="94%" style='width:94.0%;padding:3.0pt 3.0pt 3.0pt 3.0pt'>
<p class=MsoNormal><span style='font-family:Verdana'><a
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747</a><o:p></o:p></span></p>
</td>
</tr>
</table>

<p class=MsoNormal><span style='font-family:Verdana'>
<br>
<b>Contact Information<o:p></o:p></b></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>
The NISCC Vulnerability Management Team can be contacted as follows: <o:p></o:p></span></p>

<table class=MsoNormalTable border=1 cellspacing=3 cellpadding=0 width="87%"
style='width:87.0%;mso-cellspacing:2.2pt;mso-padding-alt:3.75pt 3.75pt 3.75pt 3.75pt'>
<tr style='mso-yfti-irow:0'>
<td width="30%" valign=top style='width:30.0%;padding:3.75pt 3.75pt 3.75pt 3.75pt'>
<p class=MsoNormal><span style='font-family:Verdana'>Email<o:p></o:p></span></p>
</td>
<td width="70%" style='width:70.0%;padding:3.75pt 3.75pt 3.75pt 3.75pt'>
<p class=MsoNormal><span style='font-family:Verdana'><a
href="mailto:vulteam@niscc.gov.uk">vulteam@niscc.gov.uk</a> <br>
<i>(Please quote the advisory reference in the subject line.)</i><o:p></o:p></span></p>
</td>
</tr>
<tr style='mso-yfti-irow:1'>
<td width="30%" valign=top style='width:30.0%;padding:3.75pt 3.75pt 3.75pt 3.75pt'>
<p class=MsoNormal><span style='font-family:Verdana'>Telephone<o:p></o:p></span></p>
</td>
<td width="70%" style='width:70.0%;padding:3.75pt 3.75pt 3.75pt 3.75pt'>
<p class=MsoNormal><span style='font-family:Verdana'>+44 (0)870 487 0748
Extension 4511 <br>
<i>(Monday to Friday </i></span><st1:time Minute="30" Hour="8"><i><span
style='font-family:Verdana'>08:30 - 17:00</span></i></st1:time><i><span
style='font-family:Verdana'>)</span></i><span style='font-family:Verdana'><o:p></o:p></span></p>
</td>
</tr>
<tr style='mso-yfti-irow:2'>
<td width="30%" valign=top style='width:30.0%;padding:3.75pt 3.75pt 3.75pt 3.75pt'>
<p class=MsoNormal><span style='font-family:Verdana'>Fax<o:p></o:p></span></p>
</td>
<td width="70%" style='width:70.0%;padding:3.75pt 3.75pt 3.75pt 3.75pt'>
<p class=MsoNormal><span style='font-family:Verdana'>+44 (0)870 487 0749</span><span
style='mso-bidi-font-size:10.0pt;font-family:Verdana'><o:p></o:p></span></p>
</td>
</tr>
<tr style='mso-yfti-irow:3;mso-yfti-lastrow:yes'>
<td width="30%" valign=top style='width:30.0%;padding:3.75pt 3.75pt 3.75pt 3.75pt'>
<p class=MsoNormal><span style='font-family:Verdana'>Post<o:p></o:p></span></p>
</td>
<td width="70%" style='width:70.0%;padding:3.75pt 3.75pt 3.75pt 3.75pt'>
<p class=MsoNormal><span style='font-family:Verdana'>Vulnerability Management
Team<br>
NISCC<br>
</span><st1:address><st1:Street><span style='font-family:Verdana'>PO Box 832</span></st1:Street><span
style='font-family:Verdana'><br>
</span><st1:City><span style='font-family:Verdana'>London</span></st1:City><span
style='font-family:Verdana'><br>
</span><st1:PostalCode><span style='font-family:Verdana'>SW1P 1BG</span></st1:PostalCode></st1:address><span
style='font-family:Verdana'><o:p></o:p></span></p>
<p class=MsoNormal><span style='font-family:Verdana'><o:p>&nbsp;</o:p></span></p>
</td>
</tr>
</table>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>
We encourage those who wish to communicate via email to make use of our PGP
key. This is available from <a href="http://www.uniras.gov.uk/UNIRAS.asc">http://www.uniras.gov.uk/UNIRAS.asc</a>.<o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>
Please note that </span><st1:country-region><st1:place><span style='font-family:
Verdana'>UK</span></st1:place></st1:country-region><span style='font-family:
Verdana'> government protectively marked material should not be sent to the
email address above.<o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>
If you wish to be added to our email distribution list, please email your
request to <a href="mailto:uniras@niscc.gov.uk">uniras@niscc.gov.uk</a>.<o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>
<br>
<b>What is NISCC?<o:p></o:p></b></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'>
For further information regarding the UK National Infrastructure Security
Co-Ordination Centre, please visit the NISCC web site at: <a
href="http://www.niscc.gov.uk/aboutniscc/index.htm">http://www.niscc.gov.uk/aboutniscc/index.htm</a><o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'><span
style='mso-spacerun:yes'> </span><br>
Reference to any specific commercial product, process or service by trade name,
trademark manufacturer or otherwise, does not constitute or imply its
endorsement, recommendation, or favouring by NISCC. The views and opinions of
authors expressed within this notice shall not be used for advertising or
product endorsement purposes.<o:p></o:p></span></p>

<p class=MsoNormal style='text-align:justify'><span style='font-family:Verdana'><span
style='mso-spacerun:yes'> </span><br>
Neither shall NISCC accept responsibility for any errors or omissions contained
within this advisory. In particular, they shall not be liable for any loss or
damage whatsoever, arising from or in connection with the usage of information
contained within this notice.<o:p></o:p></span></p>

<p class=MsoNormal><span style='font-family:Verdana'><span
style='mso-spacerun:yes'> </span><br>
© 2004 Crown Copyright<o:p></o:p></span></p>

<p class=MsoNormal><span style='font-family:Verdana'><br>
<b style='mso-bidi-font-weight:normal'>Revision History<o:p></o:p></b></span></p><br>

<table class=MsoNormalTable border=0 cellpadding=0 width="100%"
style='width:100.0%;mso-cellspacing:1.5pt;mso-padding-alt:0cm 5.4pt 0cm 5.4pt'>
<tr style='mso-yfti-irow:0;mso-yfti-lastrow:yes'>
<td width="23%" style='width:23.0%;padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><st1:date Year="2004" Day="15" Month="9"><span
style='font-size:10.0pt;font-family:Verdana'>Sept 15, 2004</span></st1:date><span
style='font-size:10.0pt;font-family:Verdana'>: </span><span style='font-family:
Verdana'><o:p></o:p></span></p>
</td>
<td width="77%" style='width:77.0%;padding:.75pt .75pt .75pt .75pt'>
<p class=MsoNormal><span style='font-size:10.0pt;font-family:Verdana'>Initial
release (1.0)</span><span style='font-family:Verdana'><o:p></o:p></span></p>
</td>
</tr>
</table>

<p class=MsoNormal><span style='font-family:Verdana'><br>
<End of NISCC Vulnerability Advisory><o:p></o:p></span></p>

</div>

</div>

</body>

</html>
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close