Boletines de Vulnerabilidades |
Desbordamiento de búfer en el módulo mod_include de Apache |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Aumento de privilegios |
Dificultad | Principiante |
Requerimientos del atacante | Acceso remoto con cuenta |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricant afectat | GNU/Linux |
Software afectado | Apache 1.3 <1.3.33 |
Descripción |
|
Se ha descubierto una vulnerabilidad de desbordamiento de búfer en las versiones anteriores a la 1.3.33 en la rama 1.3 del servidor Web Apache. La vulnerabilidad reside en el módulo mod_include, concretamente en el procesado de etiquetas HTML. La explotación de esta vulnerabilidad podría permitir a un atacante local ejecutar código con privilegios de un hijo httpd mediante la creación de una página HTML que incluya comandos SSI (Server Side Include) especialmente diseñados. |
|
Solución |
|
Actualización de software Apache Apache httpd 1.3.34 http://httpd.apache.org/download.cgi Debian Linux Debian Linux 3.0 Source: http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6.dsc http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6.diff.gz http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26.orig.tar.gz Componentes independientes de la arquitectura: http://security.debian.org/pool/updates/main/a/apache/apache-doc_1.3.26-0woody6_all.deb Arquitectura Alpha: http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_alpha.deb http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_alpha.deb http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_alpha.deb Arquitectura ARM: http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_arm.deb http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_arm.deb http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_arm.deb Arquitectura Intel IA-32: http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_i386.deb http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_i386.deb http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_i386.deb Arquitectura Intel IA-64: http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_ia64.deb http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_ia64.deb http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_ia64.deb Arquitectura HP Precision: http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_hppa.deb http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_hppa.deb http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_hppa.deb Arquitectura Motorola 680x0: http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_m68k.deb http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_m68k.deb http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_m68k.deb Arquitectura Big endian MIPS: http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_mips.deb http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_mips.deb http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_mips.deb Little endian MIPS: http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_mipsel.deb http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_mipsel.deb http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_mipsel.deb Arquitectura PowerPC: http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_powerpc.deb http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_powerpc.deb http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_powerpc.deb Arquitectura IBM S/390: http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_s390.deb http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_s390.deb http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_s390.deb Arquitectura Sun Sparc: http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_sparc.deb http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_sparc.deb http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_sparc.deb Mandrake Linux Mandrakelinux 9.2 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/apache-1.3.28-3.4.92mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/apache-devel-1.3.28-3.4.92mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/apache-modules-1.3.28-3.4.92mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/apache-source-1.3.28-3.4.92mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/SRPMS/apache-1.3.28-3.4.92mdk.src.rpm Mandrakelinux 9.2/AMD64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/apache-1.3.28-3.4.92mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/apache-devel-1.3.28-3.4.92mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/apache-modules-1.3.28-3.4.92mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/apache-source-1.3.28-3.4.92mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/SRPMS/apache-1.3.28-3.4.92mdk.src.rpm Mandrakelinux 10.0 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/apache-1.3.29-1.3.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/apache-devel-1.3.29-1.3.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/apache-modules-1.3.29-1.3.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/apache-source-1.3.29-1.3.100mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/apache-1.3.29-1.3.100mdk.src.rpm Mandrakelinux 10.0/AMD64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/apache-1.3.29-1.3.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/apache-devel-1.3.29-1.3.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/apache-modules-1.3.29-1.3.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/apache-source-1.3.29-1.3.100mdk.amd64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/apache-1.3.29-1.3.100mdk.src.rpm Mandrakelinux 10.1 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/apache-1.3.31-7.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/apache-devel-1.3.31-7.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/apache-modules-1.3.31-7.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/apache-source-1.3.31-7.1.101mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/apache-1.3.31-7.1.101mdk.src.rpm Mandrakelinux 10.1/X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/apache-1.3.31-7.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/apache-devel-1.3.31-7.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/apache-modules-1.3.31-7.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/apache-source-1.3.31-7.1.101mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/apache-1.3.31-7.1.101mdk.src.rpm Multi Network Firewall 8.2 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/RPMS/apache-1.3.23-4.5.M82mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/RPMS/apache-common-1.3.23-4.5.M82mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/RPMS/apache-modules-1.3.23-4.5.M82mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/SRPMS/apache-1.3.23-4.5.M82mdk.src.rpm Corporate Server 2.1 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/apache-1.3.26-7.3.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/apache-common-1.3.26-7.3.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/apache-devel-1.3.26-7.3.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/apache-manual-1.3.26-7.3.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/apache-modules-1.3.26-7.3.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/apache-source-1.3.26-7.3.C21mdk.i586.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/apache-1.3.26-7.3.C21mdk.src.rpm Corporate Server 2.1/X86_64 ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/apache-1.3.26-7.3.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/apache-common-1.3.26-7.3.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/apache-devel-1.3.26-7.3.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/apache-manual-1.3.26-7.3.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/apache-modules-1.3.26-7.3.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/apache-source-1.3.26-7.3.C21mdk.x86_64.rpm ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/apache-1.3.26-7.3.C21mdk.src.rpm Suse Linux Actualice los paquetes mediante YaST Online Update o descargándolos desde un sitio FTP de Suse. Red Hat Linux Red Hat Enterprise Linux AS (v. 2.1) & SRPMS: apache-1.3.27-9.ent.src.rpm mod_ssl-2.8.12-7.src.rpm Red Hat Enterprise Linux AS (v. 2.1) & IA-32: apache-1.3.27-9.ent.i386.rpm apache-devel-1.3.27-9.ent.i386.rpm apache-manual-1.3.27-9.ent.i386.rpm mod_ssl-2.8.12-7.i386.rpm Red Hat Enterprise Linux AS (v. 2.1) & IA-64: apache-1.3.27-9.ent.ia64.rpm apache-devel-1.3.27-9.ent.ia64.rpm apache-manual-1.3.27-9.ent.ia64.rpm mod_ssl-2.8.12-7.ia64.rpm Red Hat Enterprise Linux ES (v. 2.1) & SRPMS: apache-1.3.27-9.ent.src.rpm mod_ssl-2.8.12-7.src.rpm Red Hat Enterprise Linux ES (v. 2.1) & IA-32: apache-1.3.27-9.ent.i386.rpm apache-devel-1.3.27-9.ent.i386.rpm apache-manual-1.3.27-9.ent.i386.rpm mod_ssl-2.8.12-7.i386.rpm Red Hat Enterprise Linux WS (v. 2.1) & SRPMS: apache-1.3.27-9.ent.src.rpm mod_ssl-2.8.12-7.src.rpm Red Hat Enterprise Linux WS (v. 2.1) & IA-32: apache-1.3.27-9.ent.i386.rpm apache-devel-1.3.27-9.ent.i386.rpm apache-manual-1.3.27-9.ent.i386.rpm mod_ssl-2.8.12-7.i386.rpm Red Hat Linux Advanced Workstation 2.1 & Itanium Processor & SRPMS: apache-1.3.27-9.ent.src.rpm mod_ssl-2.8.12-7.src.rpm Red Hat Linux Advanced Workstation 2.1 & Itanium Processor & IA-64: apache-1.3.27-9.ent.ia64.rpm apache-devel-1.3.27-9.ent.ia64.rpm apache-manual-1.3.27-9.ent.ia64.rpm mod_ssl-2.8.12-7.ia64.rpm https://rhn.redhat.com/ HP HP-UX 11.04 / VirtualVault 4.7 Instalar PHSS_32140, PHSS_32182 HP-UX 11.04 / Virtualvault 4.6 Instalar PHSS_32206, PHSS_32183 HP-UX 11.04 / VirtualVault 4.5 Instalar PHSS_32141, PHSS_32184 HP Webproxy A.02.10 Instalar PHSS_32362 HP Webproxy A.02.00 Instalar PHSS_32363 Sun Solaris 9 / SPARC / patch 113146-07 Solaris 9 / x86 / patch 114145-06 http://sunsolve.sun.com/pub-cgi/show.pl?target=patchpage |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE | CAN-2004-0940 |
BID | |
Recursos adicionales |
|
Overview of security vulnerabilities in Apache httpd 1.3 http://www.apacheweek.com/features/security-13 Apache 1.3.34 http://httpd.apache.org/download.cgi Debian Security Advisory DSA 594-1 http://lists.debian.org/debian-security-announce/debian-security-announce-2004/msg00203.html Mandrake Linux Security Update Advisory (MDKSA-2004:134) http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:134 SUSE Security Summary Report (SUSE-SR:2004:001) http://www.suse.de/de/security/2004_01_sr.html Red Hat Linux Security Advisory RHSA-2004:600-12 https://rhn.redhat.com/errata/RHSA-2004-600.html HP SECURITY BULLETIN HPSBUX01113 http://www8.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX01113 Sun Alert Notification (102197) http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1 |
Histórico de versiones |
||
Versión | Comentario | Data |
1.0 | Aviso emitido | 2004-10-25 |
1.1 | Publicado Apache 1.3.33 | 2004-11-04 |
1.2 | Aviso emitido por Debian (DSA 594-1) | 2004-11-17 |
1.3 | Aviso emitido por Mandrake Linux (MDKSA-2004:134) | 2004-11-18 |
1.4 | Aviso emitido por Suse Linux (SUSE-SR:2004:001) | 2004-11-24 |
1.5 | Aviso emitido por Red Hat Linux (RHSA-2004:600-12) | 2004-12-14 |
1.6 | Aviso emitido por HP (HPSBUX01113) | 2005-01-31 |
1.7 | Publicado Apache httpd 1.3.34 | 2005-11-02 |
1.8 | Aviso emitido por Sun (102197) | 2006-03-03 |
1.9 | Aviso actualizado por Sun (102197) | 2006-06-19 |