SuSE: 2003-044: thttpd Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SUSE Security Announcement
Package: thttpd
Announcement-ID: SuSE-SA:2003:044
Date: Friday, Oct 31st 2003 13:04 MEST
Affected products: 7.3, 8.0, 8.1, 8.2, 9.0
Vulnerability Type: remote privilege escalation/
information leak
Severity (1-10): 5
SUSE default package: no
Cross References: CAN-2003-0899
CAN-2002-1562
Content of this advisory:
1) security vulnerability resolved:
- buffer overflow
- information leak (virtual hosting)
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds:
- libnids
- KDE
- postgresql
- frox
- sane
- ircd
- fileutils
- mc
- apache1/2
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
Two vulnerabilities were found in the "tiny" web-server thttpd.
The first bug is a buffer overflow that can be exploited remotely
to overwrite the EBP register of the stack. Due to memory-alignment of
the stack done by gcc 3.x this bug can not be exploited. All thttpd
versions mentioned in this advisory are compiled with gcc 3.x and are
therefore not exploitable.
The other bug occurs in the virtual-hosting code of thttpd. A remote
attacker can bypass the virtual-hosting mechanism to read arbitrary
files.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
Intel i386 Platform:
SuSE-9.0:
e33f3897cac1e1fe117eff8ca252ec0f
patch rpm(s):
cd5c2aeb6d31d6a6781f392af17a4989
source rpm(s):
c6e2446bc94c8c00d35b7741b67df678
SuSE-8.2:
a491b55f562fa0f3b1679ee819140c72
patch rpm(s):
bbb3dd624b19d8683223049a070d4cf2
source rpm(s):
2710751ff1ee8fbab3c2934c5cb09f3d
SuSE-8.1:
428db4fb2eccebb5ed16cb28161ba2a5
patch rpm(s):
b32fb0a87d8d7de3ed1953e64da89bc8
source rpm(s):
e64bc1488747a414f6bd60735f82385f
SuSE-8.0:
952dcca179b647afdeea02b987e3daf8
patch rpm(s):
e596221f34a73ba6fdd29abcecb6e211
source rpm(s):
8500be9c635d1c5c9618ecca2a09a5e7
SuSE-7.3:
16ffc5238c1f57b8a1e6e02989524e82
source rpm(s):
b5c4b9c65182fcd2a326e3edad7b2dfb
PPC Power PC Platform:
SuSE-7.3:
e7aaff82bd90c459849dd78b1cc47515
source rpm(s):
8ac31eb38063a891e37ed327a5ddbc0c
______________________________________________________________________________
2) Pending vulnerabilities in SUSE Distributions and Workarounds:
- libnids
New libnids packages were released to stop remote command execution
due to a memory corruption in the TCP reassembly code. (CAN-2003-0850)
Please download them from our FTP servers.
- KDE
New KDE packages are currently being tested. These packages fixes
several vulnerabilities:
+ remote root compromise (CAN-2003-0690)
+ weak cookies (CAN-2003-0692)
+ SSL man-in-the-middle attack
+ information leak through HTML-referrer (CAN-2003-0459)
The packages will be release as soon as testing is finished.
- postgresql
Several buffer overflow problems were fixed in the pg_to_asci()
function of postgresql server.
New packages are available on our FTP servers.
- frox
A denial-of-service attack in frox can be trigger remotely.
The packages are currently tested and will be release as soon as
possible.
- sane
The scanner service sane of SuSE Linux 7.3-8.1 is vulnerable to
a remote denial-of-service attack. This attack can even be triggered
if the attackers host is not listed in the saned.conf file.
The packages are currently tested and will be release as soon as
possible.
- ircd
The Internet Relay Chat daemon is vulnerable to a remote denial-of- service attack. The attack can be triggered by irc clients directly
connected to the daemon.
The packages are currently tested and will be release as soon as
possible.
- fileutils
A local denial-of-service attack can be triggered by abusing the -w
option of ls(1). This attack can be turned into a remote denial-of- service by using network services, like wuftpd, that rely on the
ls(1) command installed on the system.
The packages are currently tested and will be release as soon as
possible.
- mc
By using a special combination of links in archive-files it is possible
to execute arbitrary commands while mc tries to open it in its VFS.
The packages are currently tested and will be release as soon as
possible.
- apache1/2
The widely used HTTP server apache has several security vulnerabilities:
- locally exploitable buffer overflow in the regular expression code.
The attacker must be able to modify .htaccess or httpd.conf.
(affects: mod_alias and mod_rewrite)
- under some circumstances mod_cgid will output its data to the
wrong client (affects: apache2)
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SUSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References