Re: mod_ssl Buffer Overflow Condition (Update Available)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Ed Moyle wrote:
> 
> mod_ssl Buffer Overflow Condition (Update Available)
> --------------------------------------------------------
> 
> SYNOPSIS
> 
> mod_ssl (www.modssl.org) is a commonly used Apache module that
> provides strong cryptography for the Apache web server.  The
> module utilizes OpenSSL (formerly SSLeay) for the SSL implementation.
> modssl versions prior to 2.8.7-1.3.23 (Feb 23, 2002) make use of the
> underlying OpenSSL routines in a manner which could overflow a buffer
> within the implementation.  This situation appears difficult to
> exploit in a production environment, however, for reasons detailed
> below.

Ooops! Apologies, I misread my code. Apache-SSL is, in fact, vulnerable
to this flaw. I'll be issuing an advisory shortly.

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux