Concerning this vulnerability: is safe to assume that a patched
reverse proxy will protect a vulnerable back end server from such
malicious requests?

cu - Harry
 
>>>>> "jwoolley" == jwoolley  <[EMAIL PROTECTED]> writes:

    jwoolley>  [[ Note: this issue affects both 32-bit and 64-bit
    jwoolley> platforms; the subject of this message emphasizes 32-bit
    jwoolley> platforms since that is the most important information
    jwoolley> not announced in our previous advisory. ]]


    jwoolley> SUPERSEDES:
    jwoolley> http://httpd.apache.org/info/security_bulletin_20020617.txt

    jwoolley> Date: June 20, 2002 Product: Apache Web Server Versions:
    jwoolley> Apache 1.3 all versions including 1.3.24; Apache 2.0 all
    jwoolley> versions up to 2.0.36; Apache 1.2 all versions.

    jwoolley> CAN-2002-0392 (mitre.org) [CERT VU#944335]

    jwoolley> ----------------------------------------------------------
    jwoolley> ------------UPDATED ADVISORY------------
    jwoolley> ----------------------------------------------------------
    jwoolley> Introduction:

    jwoolley> While testing for Oracle vulnerabilities, Mark
    jwoolley> Litchfield discovered a denial of service attack for
    jwoolley> Apache on Windows.  Investigation by the Apache Software
    jwoolley> Foundation showed that this issue has a wider scope,
    jwoolley> which on some platforms results in a denial of service
    jwoolley> vulnerability, while on some other platforms presents a
    jwoolley> potential remote exploit vulnerability.

    jwoolley> This follow-up to our earlier advisory is to warn of
    jwoolley> known-exploitable conditions related to this
    jwoolley> vulnerability on both 64-bit platforms and 32-bit
    jwoolley> platforms alike.  Though we previously reported that
    jwoolley> 32-bit platforms were not remotely exploitable, it has
    jwoolley> since been proven by Gobbles that certain conditions
    jwoolley> allowing exploitation do exist.

    jwoolley> Successful exploitation of this vulnerability can lead
    jwoolley> to the execution of arbitrary code on the server with
    jwoolley> the permissions of the web server child process.  This
    jwoolley> can facilitate the further exploitation of
    jwoolley> vulnerabilities unrelated to Apache on the local system,
    jwoolley> potentially allowing the intruder root access.

    jwoolley> Note that early patches for this issue released by ISS
    jwoolley> and others do not address its full scope.

    jwoolley> Due to the existence of exploits circulating in the wild
    jwoolley> for some platforms, the risk is considered high.

    jwoolley> The Apache Software Foundation has released versions
    jwoolley> 1.3.26 and 2.0.39 that address and fix this issue, and
    jwoolley> all users are urged to upgrade immediately; updates can
    jwoolley> be downloaded from http://httpd.apache.org/ .

    jwoolley> As a reminder, we respectfully request that anyone who
    jwoolley> finds a potential vulnerability in our software reports
    jwoolley> it to [EMAIL PROTECTED]

    jwoolley> ----------------------------------------------------------

    jwoolley> The full text of this advisory including additional
    jwoolley> details is available at
    jwoolley> http://httpd.apache.org/info/security_bulletin_20020620.txt
    jwoolley> .

Reply via email to