Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2010.0073 Apache HTTP Server (httpd) 2.2.15 Released 8 March 2010 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Apache HTTP Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Unauthorised Access -- Remote/Unauthenticated Provide Misleading Information -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2010-0434 CVE-2010-0425 CVE-2010-0408 CVE-2009-3555 Member content until: Wednesday, April 7 2010 Reference: ASB-2010.0070 ASB-2009.1125.2 OVERVIEW Apache HTTP Server (httpd) 2.2.15 has been released fixing mulitple vulnerabilities. [1] IMPACT The Apache Software Foundation states that the 2.2.15 release resolves the following security issues: *) "SECURITY: CVE-2009-3555 (cve.mitre.org) mod_ssl: Comprehensive fix of the TLS renegotiation prefix injection attack when compiled against OpenSSL version 0.9.8m or later. Introduces the 'SSLInsecureRenegotiation' directive to reopen this vulnerability and offer unsafe legacy renegotiation with clients which do not yet support the new secure renegotiation protocol, RFC 5746." [2] *) "SECURITY: CVE-2009-3555 (cve.mitre.org) mod_ssl: A partial fix for the TLS renegotiation prefix injection attack by rejecting any client-initiated renegotiations. Forcibly disable keepalive for the connection if there is any buffered data readable. Any configuration which requires renegotiation for per-directory/location access control is still vulnerable, unless using OpenSSL >= 0.9.8l. [2] *) "SECURITY: CVE-2010-0408 (cve.mitre.org) mod_proxy_ajp: Respond with HTTP_BAD_REQUEST when the body is not sent when request headers indicate a request body is incoming; not a case of HTTP_INTERNAL_SERVER_ERROR." [2] *) SECURITY: CVE-2010-0425 (cve.mitre.org) mod_isapi: Do not unload an isapi .dll module until the request processing is completed, avoiding orphaned callback pointers." [2] *) "SECURITY: CVE-2010-0434 (cve.mitre.org) Ensure each subrequest has a shallow copy of headers_in so that the parent request headers are not corrupted. Elimiates a problematic optimization in the case of no request body." [2] MITIGATION The Apache Software Foundation has made Apache http 2.2.15 available for download via it's websites and mirrors. [3] It is expected that vendors which package the Apache http server will release updated packages shortly. REFERENCES [1] Apache HTTP Server (httpd) 2.2.15 Released http://www.apache.org/dist/httpd/Announcement2.2.html [2] Changes with Apache 2.2.15 http://apache.mirror.aussiehq.net.au/httpd/CHANGES_2.2.15 [3] Downloading the Apache HTTP Server http://httpd.apache.org/download.cgi AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFLlYBO/iFOrG6YcBERAlysAJ9WmfnRiCVwo81U2g8IFlXIxeeLJwCeOcd/ WCNaqao8u/Qrw69DV6hZ6uY= =AAcp -----END PGP SIGNATURE-----