OpenPKG CVS Repository
  http://cvs.openpkg.org/
  ____________________________________________________________________________

  Server: cvs.openpkg.org                  Name:   Ralf S. Engelschall
  Root:   /e/openpkg/cvs                   Email:  [EMAIL PROTECTED]
  Module: openpkg-web                      Date:   23-Oct-2002 14:24:15
  Branch: HEAD                             Handle: 2002102313241400

  Added files:
    openpkg-web/security    OpenPKG-SA-2002.010-apache.txt
  Modified files:
    openpkg-web             security.txt security.wml

  Log:
    add SA for Apache/mod_ssl

  Summary:
    Revision    Changes     Path
    1.6         +1  -0      openpkg-web/security.txt
    1.22        +1  -0      openpkg-web/security.wml
    1.1         +73 -0      openpkg-web/security/OpenPKG-SA-2002.010-apache.txt
  ____________________________________________________________________________

  Index: openpkg-web/security.txt
  ============================================================
  $ cvs diff -u -r1.5 -r1.6 security.txt
  --- openpkg-web/security.txt  4 Oct 2002 19:47:18 -0000       1.5
  +++ openpkg-web/security.txt  23 Oct 2002 12:24:14 -0000      1.6
  @@ -1,3 +1,4 @@
  +23-Oct-2002: Security Advisory: S<OpenPKG-SA-2002.010-apache>
   04-Oct-2002: Security Advisory: S<OpenPKG-SA-2002.009-apache>
   30-Jul-2002: Security Advisory: S<OpenPKG-SA-2002.008-openssl>
   30-Jul-2002: Security Advisory: S<OpenPKG-SA-2002.007-mm>
  Index: openpkg-web/security.wml
  ============================================================
  $ cvs diff -u -r1.21 -r1.22 security.wml
  --- openpkg-web/security.wml  4 Oct 2002 19:47:18 -0000       1.21
  +++ openpkg-web/security.wml  23 Oct 2002 12:24:14 -0000      1.22
  @@ -70,6 +70,7 @@
      <a href="security/OpenPKG-SA-%0-%1.txt">TXT</a>)<br>
   </define-tag>
   <box bdspace=10 bgcolor="#e5e0d5">
  +  <sa 2002.010 apache>
     <sa 2002.009 apache>
     <sa 2002.008 openssl>
     <sa 2002.007 mm>
  Index: openpkg-web/security/OpenPKG-SA-2002.010-apache.txt
  ============================================================
  $ cvs update -p -r1.1 OpenPKG-SA-2002.010-apache.txt
  ________________________________________________________________________
  
  OpenPKG Security Advisory                            The OpenPKG Project
  http://www.openpkg.org/security.html              http://www.openpkg.org
  [EMAIL PROTECTED]                         [EMAIL PROTECTED]
  OpenPKG-SA-2002.010                                          23-Oct-2002
  ________________________________________________________________________
  
  Package:             apache
  Vulnerability:       cross side scripting
  OpenPKG Specific:    no
  
  Affected Releases:   Affected Packages:        Corrected Packages:
  OpenPKG 1.0          <= apache-1.3.22-1.0.5    >= apache-1.3.22-1.0.6
  OpenPKG 1.1          <= apache-1.3.26-1.1.1    >= apache-1.3.26-1.1.2
  OpenPKG CURRENT      <= apache-1.3.27-20021009 >= apache-1.3.27-20021023
  
  Description:
    Joe Orton <[EMAIL PROTECTED]> discovered a cross site scripting (XSS)
    bug [3] in mod_ssl [1], the SSL/TLS component for the Apache webserver
    [2]. Like the other recent Apache XSS bugs, this only affects servers
    using a combination of "UseCanonicalName off" (_not_ the default in
    OpenPKG package of Apache) and a wildcard A record of the server in
    the DNS. Although this combination for HTTPS servers is even less
    common than with plain HTTP servers, this nevertheless could allow
    remote attackers to execute client-side script code as other web page
    visitors via the HTTP "Host" header.
  
    Please check whether you are affected by running "<prefix>/bin/rpm -q
    apache". If you have an affected version of the "apache" package (see
    above), upgrade it according to the solution below. Remember to also
    rebuild and reinstall any dependent OpenPKG packages. [4]
  
  Solution:
    Select the updated source RPM appropriate for your OpenPKG release
    [5][6][7], fetch it from the OpenPKG FTP service or a mirror location,
    verify its integrity [8], build a corresponding binary RPM from it
    and update your OpenPKG installation by finally installing the binary
    RPM [4]. For the latest OpenPKG 1.1 release, perform the following
    operations to permanently fix the security problem (for other releases
    adjust accordingly).
  
    $ ftp ftp.openpkg.org
    ftp> bin
    ftp> cd release/1.1/UPD
    ftp> get apache-1.3.26-1.1.2.src.rpm
    ftp> bye
    $ <prefix>/bin/rpm --checksig apache-1.3.26-1.1.2.src.rpm
    $ <prefix>/bin/rpm --rebuild apache-1.3.26-1.1.2.src.rpm
    $ su -
    # <prefix>/bin/rpm -Fvh <prefix>/RPM/PKG/apache-1.3.26-1.1.2.*.rpm
    # <prefix>/etc/rc apache stop start
  ________________________________________________________________________
  
  References:
    [1]  http://www.modssl.org/
    [2]  http://httpd.apache.org/
    [3]  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840
    [4]  http://www.openpkg.org/tutorial.html#regular-source
    [5]  ftp://ftp.openpkg.org/release/1.0/UPD/apache-1.3.22-1.0.6.src.rpm
    [6]  ftp://ftp.openpkg.org/release/1.1/UPD/apache-1.3.26-1.1.2.src.rpm
    [7]  ftp://ftp.openpkg.org/current/SRC/apache-1.3.27-20021023.src.rpm
    [8]  http://www.openpkg.org/security.html#signature
  ________________________________________________________________________
  
  For security reasons, this advisory was digitally signed with
  the OpenPGP public key "OpenPKG <[EMAIL PROTECTED]>" (ID 63C4CB9F)
  of the OpenPKG project which you can find under the official URL
  http://www.openpkg.org/openpkg.pgp or on http://keyserver.pgp.com/. To
  check the integrity of this advisory, verify its digital signature by
  using GnuPG (http://www.gnupg.org/). For example, pipe this message to
  the command "gpg --verify --keyserver keyserver.pgp.com".
  ________________________________________________________________________
______________________________________________________________________
The OpenPKG Project                                    www.openpkg.org
CVS Repository Commit List                     [EMAIL PROTECTED]

Reply via email to