Date: 15 November 2002
References: ESB-2002.605
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2002.638 -- Debian Security Advisory DSA 195-1
New Apache-Perl packages fix several vulnerabilities
15 November 2002
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: apache-perl
Vendor: Debian
Operating System: Debian GNU/Linux 3.0
Debian GNU/Linux 2.2
Impact: Overwrite Arbitrary Files
Denial of Service
Execute Arbitrary Code/Commands
Access Required: Remote
Ref: ESB-2002.605
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - --------------------------------------------------------------------------
Debian Security Advisory DSA 195-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
November 13th, 2002 http://www.debian.org/security/faq
- - --------------------------------------------------------------------------
Package : apache-perl
Vulnerability : several
Problem-Type : remote, local
Debian-specific: no
CVE Id : CAN-2002-0839 CAN-2002-0840 CAN-2002-0843 CAN-2001-0131 CAN-2002-1233
BugTraq ID : 5847 5884 5887
According to David Wagner, iDEFENSE and the Apache HTTP Server
Project, several vulnerabilities have been found in the Apache server
package, a commonly used webserver. Most of the code is shared
between the Apache and Apache-Perl packages, so vulnerabilities are
shared as well.
These vulnerabilities could allow an attacker to enact a denial of
service against a server or execute a cross site scripting attack, or
steal cookies from other web site users. The Common Vulnerabilities
and Exposures (CVE) project identified the following vulnerabilities:
1. CAN-2002-0839: A vulnerability exists on platforms using System V
shared memory based scoreboards. This vulnerability allows an
attacker to execute code under the Apache UID to exploit the Apache
shared memory scoreboard format and send a signal to any process as
root or cause a local denial of service attack.
2. CAN-2002-0840: Apache is susceptible to a cross site scripting
vulnerability in the default 404 page of any web server hosted on a
domain that allows wildcard DNS lookups.
3. CAN-2002-0843: There were some possible overflows in the utility
ApacheBench (ab) which could be exploited by a malicious server.
No such binary programs are distributed by the Apache-Perl package,
though.
4. CAN-2002-1233: A race condition in the htpasswd and htdigest
program enables a malicious local user to read or even modify the
contents of a password file or easily create and overwrite files as
the user running the htpasswd (or htdigest respectively) program.
No such binary programs are distributed by the Apache-Perl package,
though.
5. CAN-2001-0131: htpasswd and htdigest in Apache 2.0a9, 1.3.14, and
others allows local users to overwrite arbitrary files via a
symlink attack. No such binary programs are distributed by the
Apache-Perl package, though.
6. NO-CAN: Several buffer overflows have been found in the ApacheBench
(ab) utility that could be exploited by a remote server returning
very long strings. No such binary programs are distributed by the
Apache-Perl package, though.
These problems have been fixed in version 1.3.26-1-1.26-0woody2 for
the current stable distribution (woody), in
1.3.9-14.1-1.21.20000309-1.1 for the old stable distribution (potato)
and in version 1.3.26-1.1-1.27-3-1 for the unstable distribution
(sid).
We recommend that you upgrade your Apache-Perl package immediately.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 2.2 alias potato
- - ---------------------------------
Source archives:
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.9-14.1-1.21.20000309-1.1.dsc
Size/MD5 checksum: 612 8fa1cd6e001b2621a749f4b5c649e970
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.9-14.1-1.21.20000309-1.1.tar.gz
Size/MD5 checksum: 2403933 6d1ced52706288e401f84064cbff823d
Alpha architecture:
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.9-14.1-1.21.20000309-1.1_alpha.deb
Size/MD5 checksum: 1126584 949eb23cd106f0d1be213a2d1f222e35
ARM architecture:
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.9-14.1-1.21.20000309-1.1_arm.deb
Size/MD5 checksum: 1000058 6403c48425e4b62e3e5d232eb0eca5d8
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.9-14.1-1.21.20000309-1.1_i386.deb
Size/MD5 checksum: 956320 da48dac81fbc5f66e7f9f350c2eb90bb
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.9-14.1-1.21.20000309-1.1_m68k.deb
Size/MD5 checksum: 923340 bdc936f40eb10f523a7f865f3a7bf19e
PowerPC architecture:
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.9-14.1-1.21.20000309-1.1_powerpc.deb
Size/MD5 checksum: 1005128 a237e415455689fb02143ff8c8b94b50
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.9-14.1-1.21.20000309-1.1_sparc.deb
Size/MD5 checksum: 1001880 033f4c4ec40b4aa2600484e93082b798
Debian GNU/Linux 3.0 alias woody
- - --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.26-1-1.26-0woody2.dsc
Size/MD5 checksum: 706 de8082abd65d3b5996c16b17b8a925a5
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.26-1-1.26-0woody2.tar.gz
Size/MD5 checksum: 3290245 13ef2acabfbae0ad98b6e70b2dc724fe
Alpha architecture:
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.26-1-1.26-0woody2_alpha.deb
Size/MD5 checksum: 247946 387b3e7006576a5bcaad96ab02dd5108
ARM architecture:
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.26-1-1.26-0woody2_arm.deb
Size/MD5 checksum: 207682 097b58c87cef40cf815937c07e31e8ca
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.26-1-1.26-0woody2_i386.deb
Size/MD5 checksum: 193440 b131f4f5e43cffc2a15f6b2f83f016c6
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.26-1-1.26-0woody2_ia64.deb
Size/MD5 checksum: 320266 8fe41e1bcc6b16ada481082508af249d
HP Precision architecture:
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.26-1-1.26-0woody2_hppa.deb
Size/MD5 checksum: 241968 0223028e1a9483980427779b4b4c5ff8
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.26-1-1.26-0woody2_m68k.deb
Size/MD5 checksum: 182532 d9086e11cbf640adb05981afed42f9b2
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.26-1-1.26-0woody2_mips.deb
Size/MD5 checksum: 219074 1d0801e02d82f0e1638f4837b3ba89da
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.26-1-1.26-0woody2_mipsel.deb
Size/MD5 checksum: 218656 aca5ed9a669785205ded19e00a702a9d
PowerPC architecture:
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.26-1-1.26-0woody2_powerpc.deb
Size/MD5 checksum: 208896 30a6a3398df64c1bf9967ecc329dae95
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.26-1-1.26-0woody2_s390.deb
Size/MD5 checksum: 203072 9997d9ae90f1c8a49b31ce1f43ef25ef
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/a/apache-perl/apache-perl_1.3.26-1-1.26-0woody2_sparc.deb
Size/MD5 checksum: 206058 a4c9c3cc6e1b7fc63cf23972902bee84
These files will probably be moved into the stable distribution on
its next revision.
- - ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQE90nDKW5ql+IAeqTIRAjEqAJ9l4BpiQqwMZybPsWOAYZNOCGgmhgCePnto
burPuLVFr71PuaoIFmFkAeA=
=qEOj
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/Information/advisories.html
If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business
hours which are GMT+10:00 (AEST). On call after hours
for member emergencies only.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: http://www.auscert.org.au/render.html?it=1967
iQCVAwUBPdTWpSh9+71yA2DNAQFyoAP/Zr5lVmqT8N4FD4azafsRDAlm7y4dT4oi
4tSsp0yUyCRq2NmAngADhxslEY0UrE2wLbotgxHjZM10I9b/huAuR6aVTDPMTb7g
5VAHHYJ4MPHmPALbwjGbIQp0NEh2QKwp6iVi9g5fMkeO+02Sqvo6r6lOxDtsBPpY
ACj5n4D4SR0=
=qDvG
-----END PGP SIGNATURE-----
|