Jails and multiple ip addresses with FreeBSD 7.0

2008-05-21 Thread Mark A Christofferson
Hi,

 

I currently have a webserver running Apache 2.2.8 inside of a FreeBSD
7.0 jail.  It's running several virtualhosts, and it's doing great!  My
problem is that I need to run an SSL enabled virtual  host, and that
requires me to use an IP based virtual host.  Most documentation
indicates that jails do not support multiple addresses, and I've even
found a patch for FreeBSD 6.2.  Does a patch currently exist for 7.0, or
has this functionality been built in to the new version?

 

Thanks,  

 

Mark A. Christofferson

Network Administrator

LSU College of Agriculture

Phone:  (225)578-2767

E-Mail:  [EMAIL PROTECTED]

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"


Apache 2.2.8 and mod_ssl

2008-04-10 Thread Mark A Christofferson
Hello,

 

I am currently running the Apache 2.2.8 port on the FreeBSD 6.3 platform
with mod_ssl enabled.  I received the following vulnerability scan
results from my organization:

 

Vulnerability:  mod_ssl Off-By-One HTAccess Buffer Overflow
Vulnerability

Risk Level:

Signature Group: Safe

Description: The remote host is using a version of mod_ssl which is
older than 2.8.10. This version is vulnerable

to an off by one buffer overflow, which may allow a user with write
access to .htaccess files to

execute arbitrary code on the system with permissions of the web server.

Resolution: Fixes have been made available by the affected vendor. We
recommend upgrading mod_ssl to a

more recent version that contains fixes addressing this issue.

BugTraq: 5084

CVE: CVE-2002-0653

CVSS: 4.9

 

I referenced CVE-2002-0653, noting that it is from 2002, and noticed
that there is no mention of this vulnerability affecting any version of
apache paired with mod_ssl in the 2.x branches.  I also can't find a
version 2.8.10 or greater for Apache 2.2.8.  I did find a site that
mentioned certain distributions patched the apache software so that this
vulnerability is no longer a concern.  

 

Could anyone give me some insight on this issue?  Is there a document I
overlooked that outlines remedial procedures, an updated ssl module, or
has the software been patched to negate the vulnerability?

 

I greatly appreciate any assistance on this matter,

 

Mark

___
freebsd-questions@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-questions
To unsubscribe, send any mail to "[EMAIL PROTECTED]"