-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2010.0073
                Apache HTTP Server (httpd) 2.2.15 Released
                               8 March 2010

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Apache HTTP
Operating System:     Windows
                      UNIX variants (UNIX, Linux, OSX)
Impact/Access:        Unauthorised Access            -- Remote/Unauthenticated
                      Provide Misleading Information -- Remote/Unauthenticated
                      Denial of Service              -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
CVE Names:            CVE-2010-0434 CVE-2010-0425 CVE-2010-0408
                      CVE-2009-3555  
Member content until: Wednesday, April  7 2010
Reference:            ASB-2010.0070
                      ASB-2009.1125.2

OVERVIEW

        Apache HTTP Server (httpd) 2.2.15 has been released fixing mulitple
        vulnerabilities. [1]


IMPACT

        The Apache Software Foundation states that the 2.2.15 release resolves
        the following security issues:
        
        *) "SECURITY: CVE-2009-3555 (cve.mitre.org)
           mod_ssl: Comprehensive fix of the TLS renegotiation prefix injection
           attack when compiled against OpenSSL version 0.9.8m or later. Introduces
           the 'SSLInsecureRenegotiation' directive to reopen this vulnerability
           and offer unsafe legacy renegotiation with clients which do not yet
           support the new secure renegotiation protocol, RFC 5746." [2]
        
        *) "SECURITY: CVE-2009-3555 (cve.mitre.org)
           mod_ssl: A partial fix for the TLS renegotiation prefix injection
           attack by rejecting any client-initiated renegotiations. Forcibly
           disable keepalive for the connection if there is any buffered data
           readable. Any configuration which requires renegotiation for
           per-directory/location access control is still vulnerable, unless
           using OpenSSL >= 0.9.8l. [2]
        
        *) "SECURITY: CVE-2010-0408 (cve.mitre.org)
           mod_proxy_ajp: Respond with HTTP_BAD_REQUEST when the body is not sent
           when request headers indicate a request body is incoming; not a case
           of HTTP_INTERNAL_SERVER_ERROR." [2]
        
        *) SECURITY: CVE-2010-0425 (cve.mitre.org)
           mod_isapi: Do not unload an isapi .dll module until the request
           processing is completed, avoiding orphaned callback pointers." [2]
             
        *) "SECURITY: CVE-2010-0434 (cve.mitre.org)
           Ensure each subrequest has a shallow copy of headers_in so that the
           parent request headers are not corrupted.  Elimiates a problematic
           optimization in the case of no request body." [2]


MITIGATION

        The Apache Software Foundation has made Apache http 2.2.15 available
        for download via it's websites and mirrors. [3]
        
        It is expected that vendors which package the Apache http server will
        release updated packages shortly.


REFERENCES

        [1] Apache HTTP Server (httpd) 2.2.15 Released
            http://www.apache.org/dist/httpd/Announcement2.2.html

        [2] Changes with Apache 2.2.15
            http://apache.mirror.aussiehq.net.au/httpd/CHANGES_2.2.15

        [3] Downloading the Apache HTTP Server
            http://httpd.apache.org/download.cgi

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFLlYBO/iFOrG6YcBERAlysAJ9WmfnRiCVwo81U2g8IFlXIxeeLJwCeOcd/
WCNaqao8u/Qrw69DV6hZ6uY=
=AAcp
-----END PGP SIGNATURE-----