SuSE: 2004-032: apache2 Security Update
Summary
-----BEGIN PGP SIGNED MESSAGE-----
______________________________________________________________________________
SUSE Security Announcement
Package: apache2
Announcement-ID: SUSE-SA:2004:032
Date: Wednesday, Sep 15th 2004 16:00 MEST
Affected products: 8.1, 8.2, 9.0, 9.1
SUSE Linux Enterprise Server 9
Vulnerability Type: remote denial-of-service
Severity (1-10): 5
SUSE default package: no
Cross References: CAN-2004-0747
CAN-2004-0786
Content of this advisory:
1) security vulnerability resolved:
- remote denial-of-service
- local buffer overflow
problem description
2) solution/workaround
3) special instructions and notes
4) package location and checksums
5) pending vulnerabilities, solutions, workarounds:
- samba
- a2ps
- mozilla
- mc
- squid
- gtk2
- gaim
- nessus
6) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion
The Apache daemon is running on most of the web-servers used in the
Internet today.
The Red Hat ASF Security-Team and the Swedish IT Incident Center within
the National Post and Telecom Agency (SITIC) have found a bug in apache2
each.
The first vulnerability appears in the apr_uri_parse() function while
handling IPv6 addresses. The affected code passes a negative length
argument to the memcpy() function. On BSD systems this can lead to remote
command execution due to the nature of the memcpy() implementation.
On Linux this bug will result in a remote denial-of-service condition.
The second bug is a local buffer overflow that occurs while expanding
${ENVVAR} in the .htaccess and httpd.conf file. Both files are not
writeable by normal user by default.
2) solution/workaround
There is no known workaround.
3) special instructions and notes
After the new apache2 packages have been installed you have to restart
the apache2 daemon by executing the following command as root:
/usr/sbin/rcapache2 restart
4) package location and checksums
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Fhv file.rpm" to apply
the update.
Our maintenance customers are being notified individually. The packages
are being offered to install from the maintenance web.
x86 Platform:
SUSE Linux 9.1:
9b845c3d735cbd1bcac668d8c750b676
0384d427dfc90eb86c2905676e9adc07
5be402effc8131d5565591cfe10d7526
05220b62526e03cb6c2b183b523754d0
patch rpm(s):
81de5904923e436a8ef5b69d30e785ae
61e2e118d9fe7065de566292f08a1345
49ebf40839bc3481cacd83756b326d11
f37b330d2eb4f0540886fbb26c32413e
source rpm(s):
08cbcb0efed1d5555bb0613b865a6053
SUSE Linux 9.0:
27840b6a3af5fd22aa6514e5160a8069
2b6472921d506546a0b3d949b7228839
deb73562cbd878dad304b8aff2b00466
f6233d3447b716cedb7bc1b7e7e470ae
66f5c0630ebfc80409eaf9c9bb11ccb0
17edb6c60cb0a9b10a76feb97f49f755
patch rpm(s):
d1f0678ce5caf6d31afb324d4bffbce3
86ac5cf3e6d9bd9eb03184fd2bdc9905
52aa93198d5e20eaccf0b9f841f10c4d
df994be46d4dc9d00616750dd6b0b0c1
33ba4684fc5259f05ff6708ab5d48350
85252f1966a4be547c6771642fc738dd
source rpm(s):
464180f4e7e4c39cdecac9a802d589fd
SUSE Linux 8.2:
05260a9f52cc71c1818e3787c46b27dc
17ebbca6883fe62d9a9161103229e31a
2eb72f1af2c80a64922580a2408bb8e6
d2509b369c4a41dd3f2089e175449be0
fe40ce0f5a3421f0242a689155375b4f
patch rpm(s):
191173d3e403cdac75fb7a9f7bec870c
0f059ac6202f4e3589a50eb018b34244
3b34bab03c462e153d539afaf5deeb77
b3e42a5dbbd6b68052bb09482204725c
ba77a1ad221299e6cd413e6bc76a13de
source rpm(s):
f18c560ad459b862730916f79b8bb3b8
SUSE Linux 8.1:
1c77aab21c333c1e1f3498ae61eac987
b8b07652ebcb57d588cfaaa6bbb2ac84
bc71f335963a9fdf52adf6d99a93d69d
48df09d3a351cf7f5a718e71e48aa33e
68d781d4efe000a6a5ad5c7aeebbaccf
patch rpm(s):
dddd28b031ebdcee9e7c184db14a8318
fa6ac0a41463bd39856e54c0b1763ebb
d9704298ea9e359edccf824cc525f0e7
afc83912677b81ce2ec47eb94a401bff
28929bae30f7789f1945c457ba12bf9b
source rpm(s):
0132de4f1d42009a6ef81ddb2b5fc55e
x86-64 Platform:
SUSE Linux 9.1:
9e0f9899d4f9e5bb64bdb09e0bec316e
2c4ea232129aa2e1589b528b39ba4727
80d8e4d121c34d250793427050d4d0d0
7b0fb31d24bde01c46f4b361c23e208c
patch rpm(s):
8acab2f576039bd291d94012d1658568
f1fe28267d4e49bcbeaf3207b2ce28a6
154f87e3acb64512c415828a866810d7
8a6bb234f6e467f0c620c1edcd34efa0
source rpm(s):
55f7b18ef66d6db039936a811906cb86
SUSE Linux 9.0:
023e3977f7c6cad342b112a98a784934
8bd2e882f197d842484c520e94921545
254aa465d3477520b799e58e8540b72d
d2f3fdcbf23c0795e945792be8e30fb5
af40e228c3967470c45b3a56fee5b18b
8454ccf5f9e799e66507386ee3c6d516
patch rpm(s):
673aac30385aef7e15d65f3d8c2d3e4e
37ec566cc3511ca9a6c7e23f24bed85a
1eab9effa42d4d0c54e9bc618f4b97fa
d71304c7e348686cd279c9629c17a087
51b69ec124cfd5d08cf73e77c73271f2
1e9168aaaf5b204235635513e1f4c22f
source rpm(s):
fee40db2840b32cdd6af4c77f6a1b3cc
______________________________________________________________________________
5) Pending vulnerabilities in SUSE Distributions and Workarounds:
- samba
This version fixes several bugs in the Samba suite including two
denial-of-service (DoS) Vulnerabilities.
Microsoft Windows XP clients with installed Service Pack 2 crash the
Samba (smbd) process while printing.
Using macros in the smb.conf 'log file' statement might lead to an
infinite recursion.
A wrong counter and pointer handling in samba-vscan leads to a crash
of the Samba (smbd) process sometimes.
A DoS bug in smbd may allow an unauthenticated user to cause smbd to
spawn new processes, each one entering an infinite loop. After sending
a sufficient amount of packets it is possible to exhaust the memory
resources on the server. This issue is known as CAN-2004-0807.
A DoS bug in nmbd may allow an attacker to remotely crash the nmbd
daemon. This issue is known as CAN-2004-0808.
New packages are available on our FTP servers.
- a2ps
This update fixes the handling of filenames that include shell meta-
characters. Without this patch it was possible to execute shell
commands via a2ps by providing a filename that includes meta-
characters as an argument.
New packages are available on our FTP servers.
- mozilla
We are in the process of releasing updates for mozilla (and related
browsers), fixing various issues: CAN-2004-0597, CAN-2004-0718,
CAN-2004-0722, CAN-2004-0757, CAN-2004-0758, CAN-2004-0759, CAN-2004-
0760, CAN-2004-0761, CAN-2004-0762, CAN-2004-0763, CAN-2004-0764 and
CAN-2004-0765.
We will give you concrete details in a separate mozilla advisory when
the updates are available.
- mc
The console filesystem browser mc was found vulnerable to various
meta-char attacks in the extfs perl and shell scripts. These bugs
can be exploited by providing a malformed archive file to a victim
user to execute shell commands with her/his privileges.
(CAN-2004-0494)
New packages will be available soon.
- squid
Certain malformed NTLMSSP packets can crash the NTLM helpers provided by Squid (CAN-2004-0832).
New packages will be available soon.
- gtk2
This update fixes three vulnerabilities found in the XPM loader code
of the GTK Library. They are registered as:
+ CAN-2004-0782 Heap-based overflow in pixbuf_create_from_xpm
+ CAN-2004-0783 Stack-based overflow in xpm_extract_color
+ CAN-2004-0788 icon loader integer overflow.
New packages will be available soon.
- gaim
This security update fixes four security issues which are registered as:
+ CAN-2004-0754
An integer overflow in the groupware message handler exists in Gaim.
+ CAN-2004-0784
A shell escape vulnerability in the handling of smiley theme tar-
ball filenames could lead to arbitrary command execution.
+ CAN-2004-0785
Buffer overflows in Gaim could lead to a denial of service or
arbitrary code execution.
Additionally a buffer overflow in the URL parsing code of gaim is fixed.
This bug let to remote system compromise with the privileges of the user
running gaim.
- nessus
The nessus-adduser creates temporary files in $TMPDIR in an insecure
manner.
New packages will be available soon.
______________________________________________________________________________
6) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SUSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References