<<< Date Index >>>     <<< Thread Index >>>

MDKSA-2004:134 - Updated apache packages fix buffer overflow in mod_include



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                 Mandrakelinux Security Update Advisory
 _______________________________________________________________________

 Package name:           apache
 Advisory ID:            MDKSA-2004:134
 Date:                   November 15th, 2004

 Affected versions:      10.0, 10.1, 9.2, Corporate Server 2.1,
                         Multi Network Firewall 8.2
 ______________________________________________________________________

 Problem Description:

 A possible buffer overflow exists in the get_tag() function of
 mod_include, and if SSI (Server Side Includes) are enabled, a local
 attacker may be able to run arbitrary code with the rights of an httpd
 child process.  This could be done with a special HTML document using
 malformed SSI.
 
 The updated packages have been patched to prevent this problem.
 _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0940
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.0:
 0be6313dae811fcc0b001b2d9620113b  10.0/RPMS/apache-1.3.29-1.3.100mdk.i586.rpm
 6c787e8c03418783f0f7100a9e805f15  
10.0/RPMS/apache-devel-1.3.29-1.3.100mdk.i586.rpm
 e2f7d5da46a5d2e16c84a2696371d189  
10.0/RPMS/apache-modules-1.3.29-1.3.100mdk.i586.rpm
 42aafb3a8a7a88f0f77d25431b064e59  
10.0/RPMS/apache-source-1.3.29-1.3.100mdk.i586.rpm
 7aec1cfd1649215c64a103b48ea0e999  10.0/SRPMS/apache-1.3.29-1.3.100mdk.src.rpm

 Mandrakelinux 10.0/AMD64:
 758197d601e4b7ebf3392d2ba277c75c  
amd64/10.0/RPMS/apache-1.3.29-1.3.100mdk.amd64.rpm
 d8f014db6377f8143ce64528247e6cda  
amd64/10.0/RPMS/apache-devel-1.3.29-1.3.100mdk.amd64.rpm
 1df2e1b10fa30b56edd2af8155cc727b  
amd64/10.0/RPMS/apache-modules-1.3.29-1.3.100mdk.amd64.rpm
 2696f7d9da96ffe0e2dfe1cfc890f8fa  
amd64/10.0/RPMS/apache-source-1.3.29-1.3.100mdk.amd64.rpm
 7aec1cfd1649215c64a103b48ea0e999  
amd64/10.0/SRPMS/apache-1.3.29-1.3.100mdk.src.rpm

 Mandrakelinux 10.1:
 a243088ce931b9d53c12989b0a9e7a18  10.1/RPMS/apache-1.3.31-7.1.101mdk.i586.rpm
 5d3bcb6165e112ea4309f4a81901e2e9  
10.1/RPMS/apache-devel-1.3.31-7.1.101mdk.i586.rpm
 6e1b20d47e0fd002047170b888cfa318  
10.1/RPMS/apache-modules-1.3.31-7.1.101mdk.i586.rpm
 72f4a38cde2d8926940016a6189f2524  
10.1/RPMS/apache-source-1.3.31-7.1.101mdk.i586.rpm
 1716a37f5222cee27bebf5e83c0923da  10.1/SRPMS/apache-1.3.31-7.1.101mdk.src.rpm

 Mandrakelinux 10.1/X86_64:
 fab98ae8cd03d1ee56112ba150f59709  
x86_64/10.1/RPMS/apache-1.3.31-7.1.101mdk.x86_64.rpm
 4b58ca0f66f52301e136bddda3c85e79  
x86_64/10.1/RPMS/apache-devel-1.3.31-7.1.101mdk.x86_64.rpm
 7aaaaf961b6bc370df2bf65e9c65e5ff  
x86_64/10.1/RPMS/apache-modules-1.3.31-7.1.101mdk.x86_64.rpm
 7bb6ff6c0142204ec571c2aff2f300cd  
x86_64/10.1/RPMS/apache-source-1.3.31-7.1.101mdk.x86_64.rpm
 1716a37f5222cee27bebf5e83c0923da  
x86_64/10.1/SRPMS/apache-1.3.31-7.1.101mdk.src.rpm

 Corporate Server 2.1:
 dd2cfbb0ab7b92ae351b19d65a18d5c7  
corporate/2.1/RPMS/apache-1.3.26-7.3.C21mdk.i586.rpm
 c3edf47b293c026d0c2e33f774a724b2  
corporate/2.1/RPMS/apache-common-1.3.26-7.3.C21mdk.i586.rpm
 4be8f536da810f6eb1b68d5a50d4acb9  
corporate/2.1/RPMS/apache-devel-1.3.26-7.3.C21mdk.i586.rpm
 96153a44fa444ef06254cc306e1eb131  
corporate/2.1/RPMS/apache-manual-1.3.26-7.3.C21mdk.i586.rpm
 a1fa6c40d67306178ad316e93ff5fc90  
corporate/2.1/RPMS/apache-modules-1.3.26-7.3.C21mdk.i586.rpm
 fd1a28a818d4731dc2b0eb441a724660  
corporate/2.1/RPMS/apache-source-1.3.26-7.3.C21mdk.i586.rpm
 b376625c753b03c793aa43eacd9aed26  
corporate/2.1/SRPMS/apache-1.3.26-7.3.C21mdk.src.rpm

 Corporate Server 2.1/x86_64:
 3e2e5b9bdc272d7dd20a83864c120c1f  
x86_64/corporate/2.1/RPMS/apache-1.3.26-7.3.C21mdk.x86_64.rpm
 583c055dd96b1d8ca0bb1dcbdd6bb3e3  
x86_64/corporate/2.1/RPMS/apache-common-1.3.26-7.3.C21mdk.x86_64.rpm
 3d91ed0d804bf7083fcdc465b3a4458b  
x86_64/corporate/2.1/RPMS/apache-devel-1.3.26-7.3.C21mdk.x86_64.rpm
 0aade5cac03993197a02023e2c396026  
x86_64/corporate/2.1/RPMS/apache-manual-1.3.26-7.3.C21mdk.x86_64.rpm
 03a05949dec2afe3bd418cac70672d76  
x86_64/corporate/2.1/RPMS/apache-modules-1.3.26-7.3.C21mdk.x86_64.rpm
 a220e75582a4bceb685c96d255fb8541  
x86_64/corporate/2.1/RPMS/apache-source-1.3.26-7.3.C21mdk.x86_64.rpm
 b376625c753b03c793aa43eacd9aed26  
x86_64/corporate/2.1/SRPMS/apache-1.3.26-7.3.C21mdk.src.rpm

 Mandrakelinux 9.2:
 175e886ff0c9eece52bea1f261a769be  9.2/RPMS/apache-1.3.28-3.4.92mdk.i586.rpm
 b9fe7ecf4e142a9ac62b5d25654b2359  
9.2/RPMS/apache-devel-1.3.28-3.4.92mdk.i586.rpm
 26f6a86c6da232048d536564f3b77b93  
9.2/RPMS/apache-modules-1.3.28-3.4.92mdk.i586.rpm
 aaf112d3516184d3db4c6c2199bf6eae  
9.2/RPMS/apache-source-1.3.28-3.4.92mdk.i586.rpm
 7c7a7c952c51d53d803eee4b3fe5bbfa  9.2/SRPMS/apache-1.3.28-3.4.92mdk.src.rpm

 Mandrakelinux 9.2/AMD64:
 847b57769bf31fe0933ee5f2f3cd5586  
amd64/9.2/RPMS/apache-1.3.28-3.4.92mdk.amd64.rpm
 4b42d87ff1e277115eb188de3452ee12  
amd64/9.2/RPMS/apache-devel-1.3.28-3.4.92mdk.amd64.rpm
 ee420117615b815a34d012d9a6c0d59a  
amd64/9.2/RPMS/apache-modules-1.3.28-3.4.92mdk.amd64.rpm
 b1dfc904b593ec60933134edf93f2abb  
amd64/9.2/RPMS/apache-source-1.3.28-3.4.92mdk.amd64.rpm
 7c7a7c952c51d53d803eee4b3fe5bbfa  
amd64/9.2/SRPMS/apache-1.3.28-3.4.92mdk.src.rpm

 Multi Network Firewall 8.2:
 afe0f49e0bd816d726c2e5f1579eb0ce  mnf8.2/RPMS/apache-1.3.23-4.5.M82mdk.i586.rpm
 d3f3fba0c1c54cf2f3de11c3722901b8  
mnf8.2/RPMS/apache-common-1.3.23-4.5.M82mdk.i586.rpm
 04fe0084f12e171795aff5016a0da248  
mnf8.2/RPMS/apache-modules-1.3.23-4.5.M82mdk.i586.rpm
 e13e1435dc81e58010001058a521a6c7  mnf8.2/SRPMS/apache-1.3.23-4.5.M82mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandrakesoft for security.  You can obtain
 the GPG public key of the Mandrakelinux Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandrakelinux at:

  http://www.mandrakesoft.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_linux-mandrake.com

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team
  <security linux-mandrake.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFBm31lmqjQ0CJFipgRAtulAJ41liN52gjg0RZaGSi8sv2ri90JxACfdYKX
A7Poqv5LVD+++NlrOw7GWsY=
=0SvW
-----END PGP SIGNATURE-----