copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2008.0074 -- [Win][Netware][UNIX/Linux] -- Apache HTTP Server 2.2.8, 2.0.63, 1.3.41 released fixing multiple vulnerabilities

Date: 21 January 2008
References: AA-2008.0009  ESB-2008.0056  ESB-2008.0075  ESB-2008.0112  ESB-2008.0161  ESB-2008.0441  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                ESB-2008.0074 -- [Win][Netware][UNIX/Linux]
         Apache HTTP Server 2.2.8, 2.0.63, 1.3.41 released fixing
                         multiple vulnerabilities
                              21 January 2008

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Apache 2.2.8
                      Apache 2.0.63
                      Apache 1.3.41 
Publisher:            Apache
Operating System:     UNIX variants (UNIX, Linux, OSX)
                      Windows
                      Netware
Impact:               Cross-site Scripting
                      Denial of Service
Access:               Remote/Unauthenticated
CVE Names:            CVE-2008-0005 CVE-2007-6422 CVE-2007-6421
                      CVE-2007-6388 CVE-2007-5000 CVE-2007-3847

Ref:                  AA-2008.0009
                      ESB-2008.0056

Original Bulletin:    http://httpd.apache.org/security/vulnerabilities_22.html
                      http://www.apache.org/dist/httpd/CHANGES_2.0.63
                      http://www.apache.org/dist/httpd/CHANGES_1.3.41

Comment: While this advisory primarily relates to Apache 2.2.8, versions 2.0.63
         and 1.3.41 have also been released. According to the Apache website,
         version 2.2.8 also addresses a vulnerability not mentioned in the
         below advisory:
         
         "low: mod_proxy_ftp UTF-7 XSS CVE-2008-0005
           A workaround was added in the mod_proxy_ftp module. On sites where
           mod_proxy_ftp is enabled and a forward proxy is configured, a
           cross-site scripting attack is possible against Web browsers which
           do not correctly derive the response character set following the
           rules in RFC 2616."
         
         Version 2.0.63 addresses the vulnerabilities identified below in
         CVE-2007-6388 and CVE-2007-5000.
         
         Version 1.3.41 addresses a separate vulnerability in addition to
         those mentioned above which is specific to the Windows and Netware
         platforms:
         
         "CVE-2007-3847 (cve.mitre.org)
           mod_proxy: Prevent reading past the end of a buffer when parsing
           date-related headers.  PR 41144."

- --------------------------BEGIN INCLUDED TEXT--------------------

              Apache HTTP Server 2.2.8 (2.0.63, 1.3.41) Released

    The Apache Software Foundation and the Apache HTTP Server Project are 
    pleased to announce the release of version 2.2.8 of the Apache HTTP Server 
    ("Apache").  This version of Apache is principally a bug and security fix
    release. The following potential security flaws are addressed:

      * CVE-2007-6421 (cve.mitre.org)
        mod_proxy_balancer: Correctly escape the worker route and the worker
        redirect string in the HTML output of the balancer manager.
        Reported by SecurityReason.

        A flaw was found in the mod_proxy_balancer module. On sites where
        mod_proxy_balancer is enabled, a cross-site scripting attack against
        an authorized user is possible.

      * CVE-2007-6422 (cve.mitre.org)
        Prevent crash in balancer manager if invalid balancer name is passed
        as parameter. Reported by SecurityReason.

        A flaw was found in the mod_proxy_balancer module. On sites where
        mod_proxy_balancer is enabled, an authorized user could send a
        carefully crafted request that would cause the Apache child process
        handling that request to crash. This could lead to a denial of
        service if using a threaded Multi-Processing Module.

      * CVE-2007-6388 (cve.mitre.org)
        mod_status: Ensure refresh parameter is numeric to prevent
        a possible XSS attack caused by redirecting to other URLs.
        Reported by SecurityReason.

        A flaw was found in the mod_status module. On sites where  mod_status
        is enabled and the status pages were publicly accessible, a cross-site 
        scripting attack is possible. Note that the server-status page is not 
        enabled by default and it is best practice to not make this publicly 
        available.

      * CVE-2007-5000 (cve.mitre.org)
        mod_imagemap: Fix a cross-site scripting issue. Reported by JPCERT.

        A flaw was found in the mod_imap module. On sites where mod_imap is 
        enabled and an imagemap file is publicly available, a cross-site 
        scripting attack is possible.

    We consider this release to be the best version of Apache available, and
    encourage users of all prior versions to upgrade.

    Apache HTTP Server 2.2.8 is available for download from:

      http://httpd.apache.org/download.cgi

    Apache 2.2 offers numerous enhancements, improvements, and performance
    boosts over the 2.0 codebase.  For an overview of new features introduced
    since 2.0 please see:

      http://httpd.apache.org/docs/2.2/new_features_2_2.html

    Please see the CHANGES_2.2 file, linked from the download page, for a
    full list of changes.  A condensed list, CHANGES_2.2.8 provides the
    complete list of changes since 2.2.6 (2.2.7 was not released). A summary
    of security vulnerabilities which were addressed in the previous 2.2.6
    and earlier releases is available:

      http://httpd.apache.org/security/vulnerabilities_22.html

    Apache HTTP Server 1.3.41 and 2.0.63 legacy releases are also currently
    available.  See the appropriate CHANGES from the url above.  See the
    corresponding CHANGES files linked from the download page.  The  Apache
    HTTP Project developers strongly encourage all users to migrate to
    Apache 2.2, as only limited maintenance is performed on these legacy
    versions.

    This release includes the Apache Portable Runtime (APR) version 1.2.12
    bundled with the tar and zip distributions.  The APR libraries libapr
    and libaprutil (and on Win32, libapriconv) must all be updated to ensure
    binary compatibility and address many known platform bugs.

    This release builds on and extends the Apache 2.0 API.  Modules written
    for Apache 2.0 will need to be recompiled in order to run with Apache 2.2,
    and require minimal or no source code changes.

      http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/VERSIONING

    When upgrading or installing this version of Apache, please bear in mind
    that if you intend to use Apache with one of the threaded MPMs (other
    than the Prefork MPM), you must ensure that any modules you will be using
    (and the libraries they depend on) are thread-safe.


- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBR5Q6nCh9+71yA2DNAQIt1QP/dKb4c0x0qoEeJ92WmXdC3XfdCZC/06nK
yJAIvCdwUH1RH/4U6W7BtxkMMN1lXts6228DEgK8tljrdpN08uHNRX3gNZZlK9cW
UHYW6ZcKdCDVL+PLIGl9kNL5N4KswJvm04WrNpyEoLvSruO0LWa8hZfo7y8WZLOR
7O4KH6S21GY=
=8UNW
-----END PGP SIGNATURE-----