Debian Security Advisory

DSA-594-1 apache -- buffer overflows

Date Reported:
17 Nov 2004
Affected Packages:
apache
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2004-0940.
More information:

Two vulnerabilities have been identified in the Apache 1.3 webserver:

  • CAN-2004-0940

    "Crazy Einstein" has discovered a vulnerability in the "mod_include" module, which can cause a buffer to be overflown and could lead to the execution of arbitrary code.

  • NO VULN ID

    Larry Cashdollar has discovered a potential buffer overflow in the htpasswd utility, which could be exploited when user-supplied is passed to the program via a CGI (or PHP, or ePerl, ...) program.

For the stable distribution (woody) these problems have been fixed in version 1.3.26-0woody6.

For the unstable distribution (sid) these problems have been fixed in version 1.3.33-2.

We recommend that you upgrade your apache packages.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6.dsc
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6.diff.gz
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26.orig.tar.gz
Architecture-independent component:
http://security.debian.org/pool/updates/main/a/apache/apache-doc_1.3.26-0woody6_all.deb
Alpha:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_alpha.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_alpha.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_arm.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_arm.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_i386.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_i386.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_ia64.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_ia64.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_hppa.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_hppa.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_m68k.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_m68k.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_mips.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_mips.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_mipsel.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_mipsel.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_powerpc.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_powerpc.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_s390.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_s390.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_sparc.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_sparc.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_sparc.deb

MD5 checksums of the listed files are available in the original advisory.