Apache 2.2.8 mod_ssl Vulnerability Notification Assistance

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

 

I have asked this question previously on both the FreeBSD Mailing List and the mod_ssl mailing list, but didn’t receive a response.

 

I am currently running the Apache 2.2.8 port on the FreeBSD 6.3 platform with mod_ssl enabled.  I received the following vulnerability scan results from my organization:

 

Vulnerability:  mod_ssl Off-By-One HTAccess Buffer Overflow Vulnerability

Risk Level:

Signature Group: Safe

Description: The remote host is using a version of mod_ssl which is older than 2.8.10. This version is vulnerable

to an off by one buffer overflow, which may allow a user with write access to .htaccess files to

execute arbitrary code on the system with permissions of the web server.

Resolution: Fixes have been made available by the affected vendor. We recommend upgrading mod_ssl to a

more recent version that contains fixes addressing this issue.

BugTraq: 5084

CVE: CVE-2002-0653

CVSS: 4.9

 

I referenced CVE-2002-0653, noting that it is from 2002, and noticed that there is no mention of this vulnerability affecting any version of apache paired with mod_ssl in the 2.x branches.  I also can’t find a version 2.8.10 or greater for Apache 2.2.8.  I did find a site that mentioned certain distributions patched the apache software so that this vulnerability is no longer a concern. 

 

Could anyone give me some insight on this issue?  Is there a document I overlooked that outlines remedial procedures, an updated ssl module, or has the software been patched to negate the vulnerability?

 

I greatly appreciate any assistance on this matter,

 

Mark


[Index of Archives]     [Open SSH Users]     [Linux ACPI]     [Linux Kernel]     [Linux Laptop]     [Kernel Newbies]     [Security]     [Netfilter]     [Bugtraq]     [Squid]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Samba]     [Video 4 Linux]     [Device Mapper]

  Powered by Linux