-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

        ESB-2005.0841 -- PK13230; 2.0.47.1: IBM HTTP Server V2.0.47
                   and V2.0.42 cumulative securit e-fix
                              24 October 2005

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM HTTP Server V2.0.47 and V2.0.42
Publisher:         IBM
Operating System:  AIX
                   HP-UX
                   Linux variants
                   Solaris
                   Windows
Impact:            Execute Arbitrary Code/Commands
                   Denial of Service
Access:            Remote/Unauthenticated
CVE Names:         CAN-2005-2970 CAN-2005-2728 CAN-2005-2491
                   CAN-2005-2088 CAN-2004-0942 CAN-2004-0809
                   CAN-2004-0786 CAN-2004-0747 CAN-2004-0493
                   CAN-2003-0020

Ref:               AA-2005.0015
                   AL-2004.029
                   ESB-2005.0836

Original Bulletin: 
  http://www-1.ibm.com/support/docview.wss?uid=swg24010709

- --------------------------BEGIN INCLUDED TEXT--------------------

PK13230; 2.0.47.1: IBM HTTP Server V2.0.47 and V2.0.42 cumulative security 
e-fix

   Abstract
   CAN-2005-2970, CAN-2005-2491, CAN-2005-2728 security exposures

   Download Description
   PK13230 resolves the following problem:

   ERROR DESCRIPTION:
   This interim fix corrects several security vulnerabilities and other
   problems which were resolved after the previous interim fix, PK07831.

   LOCAL FIX:

   PROBLEM SUMMARY
   USERS AFFECTED:
   IBM HTTP Server V2.0.42/2.0.47 users

   PROBLEM DESCRIPTION:
   CAN-2005-2970, CAN-2005-2491,
   CAN-2005-2728 security exposures

   RECOMMENDATION:
   None

   Address several IBM HTTP Server security issues
   - PK13066 CAN-2005-2970 worker MPM memory leak after aborted
   connection (non-Windows platforms)
   - Prevent double-free of GSKit memory during stop or restart which
   sometimes caused a coredump (non-Windows platforms)
   - Prevent double-free when an error occurred reading data from sidd
   (non-Windows platforms only).
   - PK11929 CAN-2005-2491 Fix integer overflow in PCRE which leads to a
   heap-based buffer overflow.
   - PK11929 CAN-2005-2728 Fix byte-range filter which allowed
   remote attackers to cause a denial of service (memory consumption) via
   an IBM HTTP Server header with large Range field
   - Handle strerror() returning NULL on Solaris, resolving possible
   crashes when writing to the error log.
   - Handle SSL requests where FIN is received from the client on
   Keepalive connections before the response is written.
   - sidd now reports specific error code and filename when its trace or
   error log can't be opened.
   - Fixed swapped references to ciphers 62 and 64. This resulted in
   SSLCipher* directives operating on the wrong cipher (i.e.,using 64 if
   62 had been specified).
   - Fix SSL handling of Timeout values larger than 2000 seconds,
   resolving SSL handshake failures Changes in previous interim fixes,
   included here
   - PK07831 Resolve incompatibility between IBM HTTP Server and certain
   GSKit levels
   - PK07747 Resolve incompatibility between AFPA support on
   Windows and Microsoft Security Patch MS05-019 - CAN-2005-2088
   preventative measures to prevent IBM HTTP Server request smuggling,
   from Apache 2.1.6 and future Apache 2.0.55
   - mod_ibm_ssl: include client IP address on many messages
   - mod_ibm_ssl: improve reporting of many SSL communication errors
   - Fix a servlet timeout when a POST response page contains SSI tags
   - Set RH variable to indicate which module handled or failed the
   request
   - dbmmanage: Select the database format which is accepted by IBM HTTP
   Server
   - mod_rewrite: improve performance with large RewriteMap files
   - Fix memory leak in the cache handling of mod_rewrite
   - Fix storage corruption problem with mod_userdir+suexec processing
   - PK03603 worker mpm: don't take down the whole server for a transient
   thread creation failure
   - PK05830 Prevent hangs of child processes when writing to piped
   loggers at the time of graceful restart
   - PK05957 Support the suppress-error-charset setting, as with Apache
   1.3.
   - Set REDIRECT_REMOTE_USER for redirection of authenticated requests
   - worker mpm: lower severity of mutex "error" message which can occur
   normally during restart
   - display time taken to process request in mod_status
   - mod_proxy: Handle client-aborted connections correctly
   - mod_mime_magic on Windows: support magic files with native line
   endings
   - support SHA1 passwords for mod_auth and mod_auth_dbm
   - support SendBufferSize on Windows
   - start piped loggers via the shell on Unix, to support redirection
   - mod_cgid: Fix buffer overflow processing ScriptSock directive
   - mod_ibm_ldap: put timestamp on ldap trace records for correlation
   with other logs
   - mod_ibm_ldap: return authorization error instead of internal server
   error when password has expired
   - mod_ibm_ldap: add configuration control over whether or not
   referrals are chased via "LdapReferrals [On|Off]" and
   "LdapReferralHopLimit nnn"
   - mod_ibm_ldap: add rebind support for improved compatibility with
   Microsoft Active Directory 2003
   - remove 2GB log file size restriction on Linux and Unix systems
   - PQ98957 fix IBM HTTP Server RFC violations with handling of request
   bodies by proxy
   - PQ97712 fix worker MPM problem which left stranded processes after
   shutdown
   - fix mod_deflate problems handling 304 or 204 responses
   - PK00175 mod_ibm_ssl corrupts LIBPATH, breaking startup of
   third-party module
   - fix mod_ibm_ssl storage leak during apachectl restart or apachectl
   graceful processing
   - PQ86346 Seg fault with IHS ldap/nss ldap on 390
   - fix mod_fastcgi incompatibility with WebSphere plug-in
   - rename zlib symbols used by mod_deflate to avoid collision with
   third-party modules
   - add "/server-status?showmodule" support for displaying name of
   module where request is stuck; ihsdiag 1.4.0 also exploits this
   support
   - CAN-2003-0020 escape data before writing to error log
   - fix ownership of sidd socket if IBM HTTP Server started as non-root
   on HP-UX
   - resolve CAN-2004-0809 and CAN-2004-0942 vulnerabilities
   - handle rewrite rules in <Location > applying to WebSphere resource
   - shut down worker MPM more quickly when processes are slow to exit
   - fix Expires handling with mod_cache
   - reduce severity of message for TCP_NODELAY error
   - PQ97125 CAN-2004-0942 fix memory consumption dos for folded MIME
   headers
   - add fatal exception hook for use by diagnostic modules
   - log reason for failing to connect to session id cache
   - fixed invalid info messages about non-FIPS cipher if FIPS enabled
   - fixed timeout problem in mod_ibm_ssl under load
   - fixed LDAP not escaping ctrl chars \,(,), and * as requred by RFC
   2254
   - changed LDAP queries to request minimal set of attributes
   - Potential denial of service exposure, CAN-2004-0786
   - CAN-2004-0747 buffer overflow if extremely large environment
   variables are referenced in httpd.conf or .htaccess
   - fix termination of long request lines
   - fix mod_headers functional regression since 1.3
   - fix mod_deflate large memory consumption
   - fix handling of "AllowEncodedSlashes On"
   - fix stranded piped logger processes on Windows
   - change default Windows service name to the same service name set by
   IHS installer so that -n option is not required
   - improve compatibility with 3rd party layered service providers on
   Win32
   - fix crash in mod_ibm_ssl when using client auth
   - CAN-2004-0493 remote memory allocation vulnerability
   - rotatelogs ability to use local time
   - <VirtualHost myhost> now applies to all IP addresses for myhost
   - Fix mod_deflate to handle zero length responses (such as 304
   response codes) Windows)
   - Unnecessary mod_expires error message in log
   - Microsoft Windows pool corruption at startup leading to restart
   problems
   - Some random storage logged for excessively long request line

   (Fixes in PQ85834 are not listed here.)
   Checksum of e-fix files is as follows:
   2235690824 5427200 2.0.42.2-PK13230.aix.tar
   939210679 19537920 2.0.42.2-PK13230.hpux.tar
   854827529 4474880 2.0.42.2-PK13230.linux.tar
   3035375644 4904960 2.0.42.2-PK13230.linux390.tar
   218954935 6502400 2.0.42.2-PK13230.linuxppc.tar
   2142785978 3932767 2.0.42.2-PK13230.nt.zip
   3619888137 18137088 2.0.42.2-PK13230.sun.tar
   1195706654 5304320 2.0.47.1-PK13230.aix.tar
   3981623684 19752960 2.0.47.1-PK13230.hpux.tar
   1282754306 4106240 2.0.47.1-PK13230.linux.tar
   920133865 4874240 2.0.47.1-PK13230.linux390.tar
   844387247 5683200 2.0.47.1-PK13230.linuxppc.tar
   3545755713 4019142 2.0.47.1-PK13230.nt.zip
   508704124 17763328 2.0.47.1-PK13230.sun.tar

   PROBLEM CONCLUSION:

   Comments:
   Special note:
   - mod_whatkilledus users: Upgrade to mod_whatkilledus.so from ihsdiag
   1.4.2 or later to correct a problem in mod_whatkilledus.so which can
   be encountered with this level of IBM HTTP Server.
   The latest ihsdiag package can be downloaded here: latest ihsdiag
   package can be downloaded here:
   ftp://ftp.software.ibm.com/software/websphere/ihs/support/Tools/ihsdiag/

   Prerequisites
   You ma apply this e-fix if you performed a full IBM HTTP Server
   install using one of the following versions:
   2.0.42.2-PQ85834
   2.0.42.2-PQ87339
   2.0.47-PQ85834
   2.0.47.1
   Any e-fixes you applied after the full IBM HTTP Server install
   are incorporated in this cumulative e-fix.


   Installation Instructions
   Please review the readme.txt for detailed installation instructions.

   Technical support
   1-800-IBM-SERV (U.S. Only)

   Problems (APARS) fixed Problems (APARS) fixed
   PK13230, PK07831, PQ88381, PQ90698, PQ94086, PQ94389, PK01070
- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBQ1w4BCh9+71yA2DNAQL/rAP/dtCWYi2IrHsPCFVAch7WDeu25LTu5VeU
qz5g0cYmg7EzjdmAEGpx/JCQfn2vgnZcQI3S2u65bNhV9Xpc/x6qHD2QvTZQQ23H
E0MiZkFQ1VJXTVerbFUvJ8J79wpIg1u2LhZlKlCQsbM4SDeQMv9HwkjeXZ6FTpwI
o9XBugdgRek=
=fJ4O
-----END PGP SIGNATURE-----