--------------------------------------------------------------------- Red Hat, Inc. Red Hat Security Advisory Synopsis: Stronghold: Chunked encoding vulnerability in Apache Advisory ID: RHSA-2002:118-06 Issue date: 2002-06-20 Updated on: 2002-06-20 Product: Stronghold Cross Platform Keywords: apache chunked encoding DoS Cross references: Obsoletes: CVE Names: CAN-2002-0392 --------------------------------------------------------------------- 1. Topic: The Apache Web server contains a security vulnerability which can be used to launch a denial of service attack, or in some cases, allow remote code execution. 2. Relevant releases/architectures: 3. Problem description: Versions of the Apache Web server up to and including 1.3.24 contain a bug in the routines which deal with requests encoded using "chunked" encoding. A carefully crafted invalid request can cause an Apache child process to call the memcpy() function in a way that will write past the end of its buffer, corrupting the stack. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2002-0392 to this issue. Due to the nature of the overflow on 32-bit Unix platforms this will most likely cause a segmentation violation and the child will terminate. However on some 64-bit platforms and some 32-bit platforms it is likely that it is further exploitable. This could allow arbitrary code to be run on the server as the user the Apache children are set to run as. All users of Stronghold are advised to patch or upgrade their servers 4. Solution: We have backported the security fix from the official Apache 1.3.26 release. The patch and instructions on how to apply it are available from the Stronghold resource center at http://stronghold.redhat.com/ Stronghold 3: http://stronghold.redhat.com/sh3/errata-2002-118 Stronghold 4: http://stronghold.redhat.com/sh4/errata-2002-118 Updated packages will also be made available shortly from the same URLs 5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info): 6. RPMs required: 7. Verification: MD5 sum Package Name -------------------------------------------------------------------------- These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: http://www.redhat.com/about/contact/pgpkey.html You can verify each package with the following command: rpm --checksig <filename> If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg <filename> 8. References: http://httpd.apache.org/info/security_bulletin_20020617.txt http://stronghold.redhat.com/sh3/errata-2002-118 http://stronghold.redhat.com/sh4/errata-2002-118 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0392 Copyright(c) 2000, 2001, 2002 Red Hat, Inc. _______________________________________________ Redhat-watch-list mailing list To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list