Säkerhetsbulletin från Debian

DSA-594-1 apache -- buffertspill

Rapporterat den:
2004-11-17
Berörda paket:
apache
Sårbara:
Ja
Referenser i säkerhetsdatabaser:
I Mitres CVE-förteckning: CVE-2004-0940.
Ytterligare information:

Två sårbarheter har identifierats i webbservern Apache 1.3:

  • CAN-2004-0940

    "Crazy Einstein" upptäckte en sårbarhet i modulen "mod_include", med vilken ett buffertspill kunde leda till exekvering av godtycklig kod.

  • Larry Cashdollar upptäckte ett möjligt buffertspill i htpasswd-verktyget, vilket kunde utnyttjas när data från användaren skickas till programmet via ett CGI-program (eller PHP, eller ePerl, ...).

För den stabila utgåvan (Woody) har dessa problem rättats i version 1.3.26-0woody6.

För den instabila utgåvan (Sid) har dessa problem rättats i version 1.3.33-2.

Vi rekommenderar att ni uppgraderar era apache-paket.

Rättat i:

Debian GNU/Linux 3.0 (woody)

Källkod:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6.dsc
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6.diff.gz
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26.orig.tar.gz
Arkitekturoberoende komponent:
http://security.debian.org/pool/updates/main/a/apache/apache-doc_1.3.26-0woody6_all.deb
Alpha:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_alpha.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_alpha.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_arm.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_arm.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_i386.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_i386.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_ia64.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_ia64.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_hppa.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_hppa.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_m68k.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_m68k.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_mips.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_mips.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_mipsel.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_mipsel.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_powerpc.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_powerpc.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_s390.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_s390.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/a/apache/apache_1.3.26-0woody6_sparc.deb
http://security.debian.org/pool/updates/main/a/apache/apache-common_1.3.26-0woody6_sparc.deb
http://security.debian.org/pool/updates/main/a/apache/apache-dev_1.3.26-0woody6_sparc.deb

MD5-kontrollsummor för dessa filer finns i originalbulletinen.