int(862)

Boletines de Vulnerabilidades


Desbordamiento de búfer en el módulo mod_proxy para Apache

Clasificación de la vulnerabilidad

Propiedad Valor
Nivel de Confianza Oficial
Impacto Obtener acceso
Dificultad Experto
Requerimientos del atacante Acceso remoto sin cuenta a un servicio exotico

Información sobre el sistema

Propiedad Valor
Fabricant afectat GNU/Linux
Software afectado Apache 1.3.31, 1.3.29, 1.3.28, 1.3.27, 1.3.26

Descripción

Se ha descubierto una vulnerabilidad de desbordamiento de búfer en el modulo para Apache mod_proxy. La vulnerabilidad reside en el manejo de las cabeceras 'Content-Length'.

La explotación de esta vulnerabilidad podría permitir a un atacante remoto la ejecución remota de código en algunas plataformas BSD si consigue que una instalación de Apache configurada como proxy se conecte a un sitio especialmente diseñado.

Solución

Si lo desea, aplique los mecanismos de actualización propios de su distribución, o bien baje las fuentes del software y compílelo usted mismo.


Actualización de seguridad

Apache
Apache httpd 1.3.34
http://httpd.apache.org/download.cgi

OpenBSD
OpenBSD 3.4
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.4/common/025_httpd3.patch
OpenBSD 3.5
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/013_httpd.patch

Red Hat Linux

Red Hat Enterprise Linux AS (v. 2.1)
SRPMS
apache-1.3.27-8.ent.src.rpm
mod_ssl-2.8.12-4.src.rpm
i386
apache-1.3.27-8.ent.i386.rpm
apache-devel-1.3.27-8.ent.i386.rpm
apache-manual-1.3.27-8.ent.i386.rpm
mod_ssl-2.8.12-4.i386.rpm
ia64
apache-1.3.27-8.ent.ia64.rpm
apache-devel-1.3.27-8.ent.ia64.rpm
apache-manual-1.3.27-8.ent.ia64.rpm
mod_ssl-2.8.12-4.ia64.rpm
https://rhn.redhat.com/

Red Hat Enterprise Linux ES (v. 2.1)
SRPMS
apache-1.3.27-8.ent.src.rpm
mod_ssl-2.8.12-4.src.rpm
i386
apache-1.3.27-8.ent.i386.rpm
apache-devel-1.3.27-8.ent.i386.rpm
apache-manual-1.3.27-8.ent.i386.rpm
mod_ssl-2.8.12-4.i386.rpm
https://rhn.redhat.com/

Red Hat Enterprise Linux WS (v. 2.1)
SRPMS
apache-1.3.27-8.ent.src.rpm
mod_ssl-2.8.12-4.src.rpm
i386
apache-1.3.27-8.ent.i386.rpm
apache-devel-1.3.27-8.ent.i386.rpm
apache-manual-1.3.27-8.ent.i386.rpm
mod_ssl-2.8.12-4.i386.rpm
https://rhn.redhat.com/

Red Hat Linux Advanced Workstation 2.1 Itanium Processor
SRPMS
apache-1.3.27-8.ent.src.rpm
mod_ssl-2.8.12-4.src.rpm
ia64
apache-1.3.27-8.ent.ia64.rpm
apache-devel-1.3.27-8.ent.ia64.rpm
apache-manual-1.3.27-8.ent.ia64.rpm
mod_ssl-2.8.12-4.ia64.rpm
https://rhn.redhat.com/

Debian Linux

Debian Linux 3.0
Source
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody5.dsc
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody5.diff.gz
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26.orig.tar.gz
Paquetes independientes de arquitectura
http://security.debian.org/pool/updates/main/a/apache/apache-doc_1.3.26-0woody5_all.deb
Alpha
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody5_alpha.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody5_alpha.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody5_alpha.deb
ARM
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody5_arm.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody5_arm.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody5_arm.deb
Intel IA-32
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody5_i386.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody5_i386.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody5_i386.deb
Intel IA-64
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody5_ia64.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody5_ia64.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody5_ia64.deb
HP Precision
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody5_hppa.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody5_hppa.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody5_hppa.deb
Motorola 680x0
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody5_m68k.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody5_m68k.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody5_m68k.deb
Big endian MIPS
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody5_mips.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody5_mips.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody5_mips.deb
Little endian MIPS
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody5_mipsel.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody5_mipsel.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody5_mipsel.deb
PowerPC
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody5_powerpc.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody5_powerpc.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody5_powerpc.deb
IBM S/390
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody5_s390.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody5_s390.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody5_s390.deb
Sun Sparc
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody5_sparc.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody5_sparc.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody5_sparc.deb

Mandrake Linux

Mandrakelinux 9.1
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.1/RPMS/apache-1.3.27-8.3.91mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.1/RPMS/apache-devel-1.3.27-8.3.91mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.1/RPMS/apache-modules-1.3.27-8.3.91mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.1/RPMS/apache-source-1.3.27-8.3.91mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.1/SRPMS/apache-1.3.27-8.3.91mdk.src.rpm
PPC
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/ppc/9.1/RPMS/apache-1.3.27-8.3.91mdk.ppc.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/ppc/9.1/RPMS/apache-devel-1.3.27-8.3.91mdk.ppc.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/ppc/9.1/RPMS/apache-modules-1.3.27-8.3.91mdk.ppc.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/ppc/9.1/RPMS/apache-source-1.3.27-8.3.91mdk.ppc.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/ppc/9.1/SRPMS/apache-1.3.27-8.3.91mdk.src.rpm

Mandrakelinux 9.2
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/apache-1.3.28-3.3.92mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/apache-devel-1.3.28-3.3.92mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/apache-modules-1.3.28-3.3.92mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/apache-source-1.3.28-3.3.92mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/SRPMS/apache-1.3.28-3.3.92mdk.src.rpm
AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/apache-1.3.28-3.3.92mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/apache-devel-1.3.28-3.3.92mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/apache-modules-1.3.28-3.3.92mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/apache-source-1.3.28-3.3.92mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/SRPMS/apache-1.3.28-3.3.92mdk.src.rpm

Mandrakelinux 10.0
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/apache-1.3.29-1.2.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/apache-devel-1.3.29-1.2.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/apache-modules-1.3.29-1.2.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/apache-source-1.3.29-1.2.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/apache-1.3.29-1.2.100mdk.src.rpm
AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/apache-1.3.29-1.2.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/apache-devel-1.3.29-1.2.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/apache-modules-1.3.29-1.2.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/apache-source-1.3.29-1.2.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/apache-1.3.29-1.2.100mdk.src.rpm

Corporate Server 2.1
X86
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/apache-1.3.26-7.2.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/apache-common-1.3.26-7.2.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/apache-devel-1.3.26-7.2.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/apache-manual-1.3.26-7.2.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/apache-modules-1.3.26-7.2.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/apache-source-1.3.26-7.2.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/apache-1.3.26-7.2.C21mdk.src.rpm
X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/apache-1.3.26-7.2.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/apache-common-1.3.26-7.2.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/apache-devel-1.3.26-7.2.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/apache-manual-1.3.26-7.2.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/apache-modules-1.3.26-7.2.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/apache-source-1.3.26-7.2.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/apache-1.3.26-7.2.C21mdk.src.rpm

HP

HP-UX B.11.04 Virtualvault A.04.70
PHSS_30944
PHSS_31058

HP-UX B.11.04 Virtualvault A.04.60
PHSS_30946
PHSS_31057

HP-UX B.11.04 Virtualvault A.04.50
PHSS_30647
PHSS_30648

HP-UX B.11.04 HP Webproxy A.02.10
PHSS_30950

HP-UX B.11.04 HP Webproxy A.02.00
PHSS_30949

HP-UX 11.04 / VirtualVault 4.7
Instalar PHSS_32140, PHSS_32182

HP-UX 11.04 / Virtualvault 4.6
Instalar PHSS_32206, PHSS_32183

HP-UX 11.04 / VirtualVault 4.5
Instalar PHSS_32141, PHSS_32184

HP Webproxy A.02.10
Instalar PHSS_32362

HP Webproxy A.02.00
Instalar PHSS_32363

Sun

Solaris 9
SPARC
http://sunsolve.sun.com/search/document.do?assetkey=1-21-113146-05-1
x86
http://sunsolve.sun.com/search/document.do?assetkey=1-21-114145-04-1

Solaris 8
SPARC
http://sunsolve.sun.com/search/document.do?assetkey=1-21-116973-01-1
x86
http://sunsolve.sun.com/search/document.do?assetkey=1-21-116974-01-1

SUN
SPARC Platform
Solaris 8 con parche 116973-02 o posterior
x86 Platform
Solaris 8 con parche 116974-02 o posterior

SPARC Platform
Solaris 8 con parche 116973-02 o posterior
Solaris 9 con parche 113146-05 o posterior
x86 Platform
Solaris 8 con parche 116974-02 o posterior
Solaris 9 con parche 114145-04 o posterior

Identificadores estándar

Propiedad Valor
CVE CAN-2004-0492
BID

Recursos adicionales

Overview of security vulnerabilities in Apache httpd 1.3
http://www.apacheweek.com/features/security-13

Apache 1.3.34
http://httpd.apache.org/download.cgi

OpenBSD Security Advisories
http://www.openbsd.org/security.html

Red Hat Security Advisory RHSA-2004:245-14
https://rhn.redhat.com/errata/RHSA-2004-245.html

Debian Security Advisory DSA 525-1
http://lists.debian.org/debian-security-announce/debian-security-announce-2004/msg00126.html

Mandrakesoft Security Advisory MDKSA-2004:065
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:065

HP SECURITY BULLETIN HPSBUX01057
http://www4.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX01057

HP SECURITY BULLETIN HPSBUX01113
http://www8.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX01113

Sun(sm) Alert Notification 57628
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57628-1&searchclause=

Sun Alert Notification (101841)
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101841-1&searchclause=%22category:security%22%20%22availability,%20security%22%20category:security

Sun Alert Notification (101555)
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101555-1&searchclause=%22category:security%22%20%22availability,%20s
ecurity%22%20category:security.com

Histórico de versiones

Versión Comentario Data
1.0 Aviso emitido 2004-06-11
1.1 Aviso emitido por OpenBSD 2004-06-14
1.2 Aviso emitido por Red Hat (RHSA-2004:245-14) 2004-06-15
1.3 Aviso emitido por Debian (DSA 525-1) 2004-06-28
1.4 Aviso emitido por Mandrake (MDKSA-2004:065) 2004-06-30
1.5 Aviso emitido por HP (HPSBUX01057) 2004-07-12
1.6 Aviso emitido por Sun (57628) 2004-09-09
1.7 Aviso actualizado por Sun (57628) 2004-10-13
1.8 Aviso emitido por HP (HPSBUX01113) 2005-01-31
1.9 Aviso actualizado por SUN (101841) 2005-08-12
1.10 Aviso actualizado por SUN (101555) 2005-08-19
1.11 Publicado Apache httpd 1.3.34 2005-11-02
Ministerio de Defensa
CNI
CCN
CCN-CERT