Re: [SECURITY] [DSA 187-1] New Apache packages fix several vulnerabilities

2002-11-19 Thread Olaf Meeuwissen
Roger Ward [EMAIL PROTECTED] writes:

 Anyone know how to see if UseCannocialName is on or off by default? I am
 using Apache 1.3.26.

Apart from `grep -r UseCanonicalName /etc/apache` you mean?
  If you don't know what the hard-coded default is and can't find it
in the documentation (or don't want to rely on it), by all means, be
explicit and set it in your configuration file.

HTH,
-- 
Olaf MeeuwissenEPSON KOWA Corporation, ECS
GnuPG key: 6BE37D90/AB6B 0D1F 99E7 1BF5 EB97  976A 16C7 F27D 6BE3 7D90
LPIC-2   -- I hack, therefore I am -- BOFH


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: [SECURITY] [DSA 187-1] New Apache packages fix several vulnerabilities

2002-11-19 Thread Roger Ward
Anyone know how to see if UseCannocialName is on or off by default? I am
using Apache 1.3.26.

Thanks,
Roger

On Mon, 2002-11-04 at 10:26, Martin Schulze wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 - --
 Debian Security Advisory DSA 187-1 [EMAIL PROTECTED]
 http://www.debian.org/security/ Martin Schulze
 November 4th, 2002  http://www.debian.org/security/faq
 - --
 
 Package: apache
 Vulnerability  : several
 Problem-Type   : remote, local
 Debian-specific: no
 CVE Id : CAN-2002-0839 CAN-2002-0840 CAN-2002-0843 CAN-2001-0131 
 CAN-2002-1233
 BugTraq ID : 5847 5884 5887
 
 According to David Wagner, iDEFENSE and the Apache HTTP Server
 Project, several remotely exploitable vulnerabilities have been found
 in the Apache package, a commonly used webserver.  These
 vulnerabilities could allow an attacker to enact a denial of service
 against a server or execute a cross scripting attack.  The Common
 Vulnerabilities and Exposures (CVE) project identified the following
 vulnerabilities:
 
 1. CAN-2002-0839: A vulnerability exists on platforms using System V
shared memory based scoreboards.  This vulnerability allows an
attacker who can execute under the Apache UID to exploit the Apache
shared memory scoreboard format and send a signal to any process as
root or cause a local denial of service attack.
 
 2. CAN-2002-0840: Apache is susceptible to a cross site scripting
vulnerability in the default 404 page of any web server hosted on a
domain that allows wildcard DNS lookups.
 
 3. CAN-2002-0843: There were some possible overflows in the utility
ApacheBench (ab) which could be exploited by a malicious server.
 
 4. CAN-2002-1233: A race condition in the htpasswd and htdigest
program enables a malicious local user to read or even modify the
contents of a password file or easily create and overwrite files as
the user running the htpasswd (or htdigest respectively) program.
 
 5. CAN-2001-0131: htpasswd and htdigest in Apache 2.0a9, 1.3.14, and
others allows local users to overwrite arbitrary files via a
symlink attack.
 
This is the same vulnerability as CAN-2002-1233, which was fixed in
potato already but got lost later and was never applied upstream.
 
 5. NO-CAN: Several buffer overflows have been found in the ApacheBench
(ab) utility that could be exploited by a remote server returning
very long strings.
 
 These problems have been fixed in version 1.3.26-0woody3 for the
 current stable distribution (woody) and in 1.3.9-14.3 for the old
 stable distribution (potato).  Corrected packages for the unstable
 distribution (sid) are expected soon.
 
 We recommend that you upgrade your Apache package immediately.
 
 wget url
 will fetch the file for you
 dpkg -i file.deb
 will install the referenced file.
 
 If you are using the apt-get package manager, use the line for
 sources.list as given below:
 
 apt-get update
 will update the internal database
 apt-get upgrade
 will install corrected packages
 
 You may use an automated update by adding the resources from the
 footer to the proper configuration.
 
 
 Debian GNU/Linux 2.2 alias potato
 - -
 
   Source archives:
 
 
 http://security.debian.org/pool/updates/main/a/apache/apache_1.3.9-14.3.diff.gz
   Size/MD5 checksum:   345741 5f88eecddfe95c8366888bb71e0917ce
 
 http://security.debian.org/pool/updates/main/a/apache/apache_1.3.9-14.3.dsc
   Size/MD5 checksum:  666 d69af430768983c68a2d881c4c9ee236
 
 http://security.debian.org/pool/updates/main/a/apache/apache_1.3.9.orig.tar.gz
   Size/MD5 checksum:  1691969 6758fe8b931be0b634b6737d9debf703
 
   Architecture independent components:
 
 
 http://security.debian.org/pool/updates/main/a/apache/apache-doc_1.3.9-14.3_all.deb
   Size/MD5 checksum:   544588 95611594e54cb8bf69b5ffa47598a17d
 
   Alpha architecture:
 
 
 http://security.debian.org/pool/updates/main/a/apache/apache_1.3.9-14.3_alpha.deb
   Size/MD5 checksum:   409920 178a31efa994c54161515d7e5dceb32a
 
 http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.9-14.3_alpha.deb
   Size/MD5 checksum:   809564 102b7a7ed3be7752ff80f209c755ca8e
 
 http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.9-14.3_alpha.deb
   Size/MD5 checksum:   754386 39db60aedbba0afaa45015149e6cabd6
 
   ARM architecture:
 
 
 http://security.debian.org/pool/updates/main/a/apache/apache_1.3.9-14.3_arm.deb
   Size/MD5 checksum:   366248 3cba61971237b64017d19ed554d89d99
 
 http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.9-14.3_arm.deb
   Size/MD5 checksum:   738516 

Re: [SECURITY] [DSA 187-1] New Apache packages fix several vulnerabilities

2002-11-19 Thread Olaf Meeuwissen
Roger Ward [EMAIL PROTECTED] writes:

 Anyone know how to see if UseCannocialName is on or off by default? I am
 using Apache 1.3.26.

Apart from `grep -r UseCanonicalName /etc/apache` you mean?
  If you don't know what the hard-coded default is and can't find it
in the documentation (or don't want to rely on it), by all means, be
explicit and set it in your configuration file.

HTH,
-- 
Olaf MeeuwissenEPSON KOWA Corporation, ECS
GnuPG key: 6BE37D90/AB6B 0D1F 99E7 1BF5 EB97  976A 16C7 F27D 6BE3 7D90
LPIC-2   -- I hack, therefore I am -- BOFH



Re: [SECURITY] [DSA 187-1] New Apache packages fix several vulnerabilities

2002-11-04 Thread andrew lattis
i'm assuming these also apply to apache-ssl, but there doesn't appear to
be a new package. is it still in the works or is apache-ssl not
vulnerable?

thanks,
andrew

On 2002/11/04 04:26:57PM +0100, Mon, Martin Schulze wrote:
 
 Package: apache
 Vulnerability  : several
 Problem-Type   : remote, local
 Debian-specific: no
 CVE Id : CAN-2002-0839 CAN-2002-0840 CAN-2002-0843 CAN-2001-0131 
CAN-2002-1233
 BugTraq ID : 5847 5884 5887



msg07614/pgp0.pgp
Description: PGP signature


Re: [SECURITY] [DSA 187-1] New Apache packages fix several vulnerabilities

2002-11-04 Thread Matt Zimmerman
On Mon, Nov 04, 2002 at 10:55:53AM -0500, andrew lattis wrote:

 i'm assuming these also apply to apache-ssl, but there doesn't appear to
 be a new package. is it still in the works or is apache-ssl not
 vulnerable?

The former.

-- 
 - mdz


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]




Re: [SECURITY] [DSA 187-1] New Apache packages fix several vulnerabilities

2002-11-04 Thread andrew lattis
i'm assuming these also apply to apache-ssl, but there doesn't appear to
be a new package. is it still in the works or is apache-ssl not
vulnerable?

thanks,
andrew

On 2002/11/04 04:26:57PM +0100, Mon, Martin Schulze wrote:
 
 Package: apache
 Vulnerability  : several
 Problem-Type   : remote, local
 Debian-specific: no
 CVE Id : CAN-2002-0839 CAN-2002-0840 CAN-2002-0843 CAN-2001-0131 
 CAN-2002-1233
 BugTraq ID : 5847 5884 5887


pgpVhafO4LTXN.pgp
Description: PGP signature


Re: [SECURITY] [DSA 187-1] New Apache packages fix several vulnerabilities

2002-11-04 Thread Matt Zimmerman
On Mon, Nov 04, 2002 at 10:55:53AM -0500, andrew lattis wrote:

 i'm assuming these also apply to apache-ssl, but there doesn't appear to
 be a new package. is it still in the works or is apache-ssl not
 vulnerable?

The former.

-- 
 - mdz