[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Sheflug] [Fwd: CERT Advisory CA-2002-17 Apache Web Server Chunk Handling Vulnerability]
And Lo! The Great Prophet " Craig Andrews" uttered these words of wisdom...
> To quote the article below:
>
> Conectiva Linux
>
> "The Apache webserver shipped with Conectiva Linux is vulnerable
> to this problem. New packages fixing this problem will be announced
> to our mailing list after an official fix becomes available."
>
> So if this distro's build is vulnerable, what about the others??
Good question, hadn't read all the affected systems bit ... just the bits
that mattered to me :) If you read the Apache bulletin though, it says that
on 32-bit systems, the child process being attacked should die with a stack
overflow, thus prevent arbitary code execution. It might be possible to DOS
a system like this though. 64-bit systems however can be attacked
successfully.
Connectiva may just be playing it safe (or, setting the cat amongst the
pigeons and panicing everyone... :) ).
>
> Red Hat seem to be quite calm on the matter, saying 'we will release a
> patch when we get one'.
>
Better yet, create one, seeing as fixed versions of the source are available
(yet more quotes from CERT):
> The Apache Software Foundation has released two new versions of
> Apache that correct this vulnerability. System administrators can
> prevent the vulnerability from being exploited by upgrading to
> Apache version 1.3.25 or 2.0.39.
Chris...
--
\ Chris Johnson \
\ cej [at] nightwolf.org.uk \
\ http://cej.nightwolf.org.uk/ ~-----------------------------------+
\ Redclaw chat - http://redclaw.org.uk - telnet redclaw.org.uk 2000 \____
___________________________________________________________________
Sheffield Linux User's Group -
http://www.sheflug.co.uk/mailfaq.html
GNU the choice of a complete generation.