Korean
<< Back
VID 22194
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The Apache mod_auth_any module is vulnerable to a remote command execution vulnerability.
mod_auth_any is a runtime module for the Apache HTTP Server. This module allows you to use any command line program (such as webNIS) to authenticate a user.
mod_auth_any package in some Linux and UNIX platforms does not properly escape shell characters when a username is supplied, and therefore a remote attacker may use this module to :
- Execute arbitrary commands on the remote host
- Bypass the authentication process completely

* References:
http://www.securityfocus.com/tools/1904
http://www.net-security.org/article_out.php?id=86

* Platforms Affected:
mod_auth_any Any version
Recommendation For Red Hat Linux:
Upgrade to the latest Samba package (mod_auth_any-1.2 or later), as listed below. Refer to Red Hat Security Advisory RHSA-2003:114-09 for more information, http://rhn.redhat.com/errata/RHSA-2003-114.html

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2003-0084 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)