SuSE: 'apache-contrib' mod_auth_mysql authentication bypass vulnerability
Summary
______________________________________________________________________________
SuSE Security Announcement
Package: apache-contrib
Announcement-ID: SuSE-SA:2001:31
Date: Monday, September 10th 2001 12:30 MEST
Affected SuSE versions: 7.1, 7.2
Vulnerability Type: authentication bypass
Severity (1-10): 3
SuSE default package: no
Other affected systems: yes
Content of this advisory:
1) security vulnerability resolved: mod_auth_mysql
problem description, discussion, solution and upgrade information
2) pending vulnerabilities, solutions, workarounds
3) standard appendix (further information)
______________________________________________________________________________
1) problem description, brief discussion, solution, upgrade information
The Apache module mod_auth_mysql 1.4,which is shipped since SuSE Linux 7.1,
was found vulnerable to possible bypass authentication by MySQL command
injection.
An adversary could insert MySQL commands along with a password and these
commands will be interpreted by MySQL while mod_auth_mysql is doing the
password lookup in the database. A positive authentication could be returned.
Note, that this bug has not yet been proven exploitable so far.
A temporary fix does not exist; we recommend to update your system with the
new RPM from our FTP server.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, install the package using the command "rpm -Uhv file.rpm" to apply
the update.
After installing the updated RPM run
- rcapache restart
- SuSEconfig
i386 Intel Platform:
SuSE-7.2
7c84f6c3f8aaf2b96a312fea4d36abce
source rpm:
56ad3d7f883a3e3eb5e96c5a92f7a2e2
SuSE-7.1
cd7cedc70d56df239db8e4434344a46e
source rpm:
7a0ca55c351b81756a05dfcff4e062be
Sparc Platform:
SuSE-7.1
bdb772783eedc1fb235e2ff0af5517f7
source rpm:
a5b625c3b0820f4715aeee18d20a9306
AXP Alpha Platform:
SuSE-7.1
3958307564b855c81e556b4c7e01c105
source rpm:
143386a82750af64aec0f615fc847ab2
PPC Power PC Platform:
SuSE-7.1
97e4ab067fc16b36ecdd5bc8915379ef
source rpm:
aa2f5914d8e00ef511081096a1c33671
______________________________________________________________________________
2) Pending vulnerabilities in SuSE Distributions and Workarounds:
______________________________________________________________________________
3) standard appendix: authenticity verification, additional information
- Package authenticity verification:
SuSE update packages are available on many mirror ftp servers all over
the world. While this service is being considered valuable and important
to the free and open source software community, many users wish to be
sure about the origin of the package and its content before installing
the package. There are two verification methods that can be used
independently from each other to prove the authenticity of a downloaded
file or rpm package:
1) md5sums as provided in the (cryptographically signed) announcement.
2) using the internal gpg signatures of the rpm package.
1) execute the command
md5sum
References