From secure@conectiva.com.br Mon Jun 16 18:56:40 2003 From: Conectiva Updates To: conectiva-updates@papaleguas.conectiva.com.br, lwn@lwn.net, bugtraq@securityfocus.com, security-alerts@linuxsecurity.com, linsec@lists.seifried.org Date: Mon, 16 Jun 2003 18:28:07 -0300 Subject: [CLA-2003:661] Conectiva Security Announcement - apache -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- CONECTIVA LINUX SECURITY ANNOUNCEMENT - -------------------------------------------------------------------------- PACKAGE : apache SUMMARY : Apache 2 vulnerability DATE : 2003-06-16 18:27:00 ID : CLA-2003:661 RELEVANT RELEASES : 9 - ------------------------------------------------------------------------- DESCRIPTION Apache[1] is the most popular webserver in use today. This update addresses two security vulnerabilities which have been fixed in the recently released[2] 2.0.46 version: 1) CAN-2003-0245[3] iDefense published[5] an advisory about a vulnerability in the APR library used by Apache 2. This library contains a vulnerability in the apr_psprintf() function which could be used to make apache reference invalid memory. The most immediate impact of this vulnerability is a Denial of Service condition. Arbitrary command execution remains a possibility, but is deemed to be difficult to achieve outside a controlled environment. The packages provided with this update contain a fix for this vulnerability. 2) CAN-2003-0189[4] A problem with the build configuration scripts caused the Apache basic authentication module to not be thread-safe. Systems running a threaded server would then be vulnerable to a Denial of Service condition when authenticating users using this module. Apache in Conectiva Linux 9 is *not* vulnerable to this issue because it is not built with threads support. However, the packages available through this update have been patched to fix this problem to allow users to recompile Apache with threads support in the event they choose to do so. SOLUTION It is recommended that all Apache users upgrade their packages. IMPORTANT: it is necessary to manually restart the httpd server after upgrading the packages. In order to do this, execute the following as root: service apache stop (wait a few seconds and check with "ps ax|grep httpd" if there are any httpd processes running. On a busy webserver this could take a little longer) service apache start REFERENCES 1. http://httpd.apache.org/ 2. http://www.apache.org/dist/httpd/Announcement2.html 3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0245 4. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0189 5. http://www.idefense.com/advisory/05.30.03.txt UPDATED PACKAGES ftp://atualizacoes.conectiva.com.br/9/SRPMS/apache-2.0.45-28790U90_2cl.src.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-2.0.45-28790U90_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-devel-2.0.45-28790U90_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-doc-2.0.45-28790U90_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/apache-htpasswd-2.0.45-28790U90_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/libapr-devel-2.0.45-28790U90_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/libapr-devel-static-2.0.45-28790U90_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/libapr0-2.0.45-28790U90_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/mod_auth_ldap-2.0.45-28790U90_2cl.i386.rpm ftp://atualizacoes.conectiva.com.br/9/RPMS/mod_dav-2.0.45-28790U90_2cl.i386.rpm ADDITIONAL INSTRUCTIONS The apt tool can be used to perform RPM packages upgrades: - run: apt-get update - after that, execute: apt-get upgrade Detailed instructions reagarding the use of apt and upgrade examples can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en - ------------------------------------------------------------------------- All packages are signed with Conectiva's GPG key. The key and instructions on how to import it can be found at http://distro.conectiva.com.br/seguranca/chave/?idioma=en Instructions on how to check the signatures of the RPM packages can be found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en - ------------------------------------------------------------------------- All our advisories and generic update instructions can be viewed at http://distro.conectiva.com.br/atualizacoes/?idioma=en - ------------------------------------------------------------------------- Copyright (c) 2003 Conectiva Inc. http://www.conectiva.com - ------------------------------------------------------------------------- subscribe: conectiva-updates-subscribe@papaleguas.conectiva.com.br unsubscribe: conectiva-updates-unsubscribe@papaleguas.conectiva.com.br -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE+7jZm42jd0JmAcZARAiRGAJ9YvY29fX0lFso52C6d+Je/oDHOpACg3PUl Brsx1Jmhaw3oH2SZTAMRgos= =UeI/ -----END PGP SIGNATURE-----