int(1106)

Vulnerability Bulletins


Desbordamiento de búfer en el módulo mod_include de Apache

Vulnerability classification

Property Value
Confidence level Oficial
Impact Aumento de privilegios
Dificulty Principiante
Required attacker level Acceso remoto con cuenta

System information

Property Value
Affected manufacturer GNU/Linux
Affected software Apache 1.3 <1.3.33

Description

Se ha descubierto una vulnerabilidad de desbordamiento de búfer en las versiones anteriores a la 1.3.33 en la rama 1.3 del servidor Web Apache. La vulnerabilidad reside en el módulo mod_include, concretamente en el procesado de etiquetas HTML.

La explotación de esta vulnerabilidad podría permitir a un atacante local ejecutar código con privilegios de un hijo httpd mediante la creación de una página HTML que incluya comandos SSI (Server Side Include) especialmente diseñados.

Solution



Actualización de software

Apache
Apache httpd 1.3.34
http://httpd.apache.org/download.cgi

Debian Linux

Debian Linux 3.0
Source:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6.dsc
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6.diff.gz
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26.orig.tar.gz
Componentes independientes de la arquitectura:
http://security.debian.org/pool/updates/main/a/apache/apache-doc_1.3.26-0woody6_all.deb
Arquitectura Alpha:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_alpha.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_alpha.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_alpha.deb
Arquitectura ARM:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_arm.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_arm.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_arm.deb
Arquitectura Intel IA-32:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_i386.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_i386.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_i386.deb
Arquitectura Intel IA-64:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_ia64.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_ia64.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_ia64.deb
Arquitectura HP Precision:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_hppa.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_hppa.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_hppa.deb
Arquitectura Motorola 680x0:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_m68k.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_m68k.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_m68k.deb
Arquitectura Big endian MIPS:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_mips.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_mips.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_mipsel.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_mipsel.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_mipsel.deb
Arquitectura PowerPC:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_powerpc.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_powerpc.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_powerpc.deb
Arquitectura IBM S/390:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_s390.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_s390.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_s390.deb
Arquitectura Sun Sparc:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_sparc.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_sparc.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_sparc.deb

Mandrake Linux
Mandrakelinux 9.2
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/apache-1.3.28-3.4.92mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/apache-devel-1.3.28-3.4.92mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/apache-modules-1.3.28-3.4.92mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/RPMS/apache-source-1.3.28-3.4.92mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/9.2/SRPMS/apache-1.3.28-3.4.92mdk.src.rpm
Mandrakelinux 9.2/AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/apache-1.3.28-3.4.92mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/apache-devel-1.3.28-3.4.92mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/apache-modules-1.3.28-3.4.92mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/RPMS/apache-source-1.3.28-3.4.92mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/9.2/SRPMS/apache-1.3.28-3.4.92mdk.src.rpm
Mandrakelinux 10.0
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/apache-1.3.29-1.3.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/apache-devel-1.3.29-1.3.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/apache-modules-1.3.29-1.3.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/RPMS/apache-source-1.3.29-1.3.100mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.0/SRPMS/apache-1.3.29-1.3.100mdk.src.rpm
Mandrakelinux 10.0/AMD64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/apache-1.3.29-1.3.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/apache-devel-1.3.29-1.3.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/apache-modules-1.3.29-1.3.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/RPMS/apache-source-1.3.29-1.3.100mdk.amd64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/amd64/10.0/SRPMS/apache-1.3.29-1.3.100mdk.src.rpm
Mandrakelinux 10.1
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/apache-1.3.31-7.1.101mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/apache-devel-1.3.31-7.1.101mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/apache-modules-1.3.31-7.1.101mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/RPMS/apache-source-1.3.31-7.1.101mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/10.1/SRPMS/apache-1.3.31-7.1.101mdk.src.rpm
Mandrakelinux 10.1/X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/apache-1.3.31-7.1.101mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/apache-devel-1.3.31-7.1.101mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/apache-modules-1.3.31-7.1.101mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/RPMS/apache-source-1.3.31-7.1.101mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/10.1/SRPMS/apache-1.3.31-7.1.101mdk.src.rpm
Multi Network Firewall 8.2
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/RPMS/apache-1.3.23-4.5.M82mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/RPMS/apache-common-1.3.23-4.5.M82mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/RPMS/apache-modules-1.3.23-4.5.M82mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/mnf8.2/SRPMS/apache-1.3.23-4.5.M82mdk.src.rpm
Corporate Server 2.1
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/apache-1.3.26-7.3.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/apache-common-1.3.26-7.3.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/apache-devel-1.3.26-7.3.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/apache-manual-1.3.26-7.3.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/apache-modules-1.3.26-7.3.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/RPMS/apache-source-1.3.26-7.3.C21mdk.i586.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/corporate/2.1/SRPMS/apache-1.3.26-7.3.C21mdk.src.rpm
Corporate Server 2.1/X86_64
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/apache-1.3.26-7.3.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/apache-common-1.3.26-7.3.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/apache-devel-1.3.26-7.3.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/apache-manual-1.3.26-7.3.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/apache-modules-1.3.26-7.3.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/RPMS/apache-source-1.3.26-7.3.C21mdk.x86_64.rpm
ftp://ftp.ps.pl/mirrors/Mandrakelinux/official/updates/x86_64/corporate/2.1/SRPMS/apache-1.3.26-7.3.C21mdk.src.rpm

Suse Linux
Actualice los paquetes mediante YaST Online Update o descargándolos desde un sitio FTP de Suse.

Red Hat Linux

Red Hat Enterprise Linux AS (v. 2.1) & SRPMS:
apache-1.3.27-9.ent.src.rpm
mod_ssl-2.8.12-7.src.rpm

Red Hat Enterprise Linux AS (v. 2.1) & IA-32:
apache-1.3.27-9.ent.i386.rpm
apache-devel-1.3.27-9.ent.i386.rpm
apache-manual-1.3.27-9.ent.i386.rpm
mod_ssl-2.8.12-7.i386.rpm

Red Hat Enterprise Linux AS (v. 2.1) & IA-64:
apache-1.3.27-9.ent.ia64.rpm
apache-devel-1.3.27-9.ent.ia64.rpm
apache-manual-1.3.27-9.ent.ia64.rpm
mod_ssl-2.8.12-7.ia64.rpm

Red Hat Enterprise Linux ES (v. 2.1) & SRPMS:
apache-1.3.27-9.ent.src.rpm
mod_ssl-2.8.12-7.src.rpm

Red Hat Enterprise Linux ES (v. 2.1) & IA-32:
apache-1.3.27-9.ent.i386.rpm
apache-devel-1.3.27-9.ent.i386.rpm
apache-manual-1.3.27-9.ent.i386.rpm
mod_ssl-2.8.12-7.i386.rpm

Red Hat Enterprise Linux WS (v. 2.1) & SRPMS:
apache-1.3.27-9.ent.src.rpm
mod_ssl-2.8.12-7.src.rpm

Red Hat Enterprise Linux WS (v. 2.1) & IA-32:
apache-1.3.27-9.ent.i386.rpm
apache-devel-1.3.27-9.ent.i386.rpm
apache-manual-1.3.27-9.ent.i386.rpm
mod_ssl-2.8.12-7.i386.rpm

Red Hat Linux Advanced Workstation 2.1 & Itanium Processor & SRPMS:
apache-1.3.27-9.ent.src.rpm
mod_ssl-2.8.12-7.src.rpm

Red Hat Linux Advanced Workstation 2.1 & Itanium Processor & IA-64:
apache-1.3.27-9.ent.ia64.rpm
apache-devel-1.3.27-9.ent.ia64.rpm
apache-manual-1.3.27-9.ent.ia64.rpm
mod_ssl-2.8.12-7.ia64.rpm
https://rhn.redhat.com/

HP

HP-UX 11.04 / VirtualVault 4.7
Instalar PHSS_32140, PHSS_32182

HP-UX 11.04 / Virtualvault 4.6
Instalar PHSS_32206, PHSS_32183

HP-UX 11.04 / VirtualVault 4.5
Instalar PHSS_32141, PHSS_32184

HP Webproxy A.02.10
Instalar PHSS_32362

HP Webproxy A.02.00
Instalar PHSS_32363

Sun
Solaris 9 / SPARC / patch 113146-07
Solaris 9 / x86 / patch 114145-06
http://sunsolve.sun.com/pub-cgi/show.pl?target=patchpage

Standar resources

Property Value
CVE CAN-2004-0940
BID

Other resources

Overview of security vulnerabilities in Apache httpd 1.3
http://www.apacheweek.com/features/security-13

Apache 1.3.34
http://httpd.apache.org/download.cgi

Debian Security Advisory DSA 594-1
http://lists.debian.org/debian-security-announce/debian-security-announce-2004/msg00203.html

Mandrake Linux Security Update Advisory (MDKSA-2004:134)
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:134

SUSE Security Summary Report (SUSE-SR:2004:001)
http://www.suse.de/de/security/2004_01_sr.html

Red Hat Linux Security Advisory RHSA-2004:600-12
https://rhn.redhat.com/errata/RHSA-2004-600.html

HP SECURITY BULLETIN HPSBUX01113
http://www8.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX01113

Sun Alert Notification (102197)
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1

Version history

Version Comments Date
1.0 Aviso emitido 2004-10-25
1.1 Publicado Apache 1.3.33 2004-11-04
1.2 Aviso emitido por Debian (DSA 594-1) 2004-11-17
1.3 Aviso emitido por Mandrake Linux (MDKSA-2004:134) 2004-11-18
1.4 Aviso emitido por Suse Linux (SUSE-SR:2004:001) 2004-11-24
1.5 Aviso emitido por Red Hat Linux (RHSA-2004:600-12) 2004-12-14
1.6 Aviso emitido por HP (HPSBUX01113) 2005-01-31
1.7 Publicado Apache httpd 1.3.34 2005-11-02
1.8 Aviso emitido por Sun (102197) 2006-03-03
1.9 Aviso actualizado por Sun (102197) 2006-06-19
Ministerio de Defensa
CNI
CCN
CCN-CERT