Korean
<< Back
VID 22265
Severity 30
Port 443
Protocol TCP
Class WWW
Detailed Description The remote Web server is using a version of Apache mod_ssl module which is older than 2.8.18.
The mod_ssl authentication module for Apache HTTP Server is vulnerable to a stack-based buffer overflow vulnerability, which exists in the ssl_util_uuencode_binary function in ssl_util.c for Apache mod_ssl. This issue would most likely result in a denial of service if triggered, but could theoretically allow for execution of arbitrary code.

* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability. Several Linux distributions patched the old version of mod_ssl module, so this might be a false positive. Please contact your vendor to determine if your Web server really is vulnerable to this flaw. If the server already has been patched or reported by vendor that is not vulnerable, then ignore this alert.

* References:
http://archives.neohapsis.com/archives/fulldisclosure/2004-05/0856.html

* Platforms Affected:
Apache HTTP Server Any version
Mandrake Linux Any version
Gentoo Linux Any version
Slackware Linux 8.1, 9.0, 9.1, current
Linux Any version
Unix Any version
Recommendation If the server identified as being vulnerable to this flaw, already has been patched or reported by vendor that is not vulnerable, please ignore this recommendation.

For Apache 1.3.x:
Upgrade to the latest version (mod_ssl 2.8.18 for Apache 1.3.31 or later) of apache and mod_ssl, available from Web site for Apache mod_ssl at http://www.modssl.org/

For Apache 2.0.x:
A patch to address this issue in the 2.0 branch of Apache is available from the following location:
http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/ssl/ssl_engine_kernel.c?r1=1.105&r2=1.106

For Mandrake Linux (mod_ssl for Apache 2):
Upgrade to the latest apache package by referring to MandrakeSoft Security Advisory MDKSA-2004:055:apache2 at http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:055

For Mandrake Linux (mod_ssl for Apache 1.3.x):
Upgrade to the latest apache package by referring to MandrakeSoft Security Advisory MDKSA-2004:054:mod_ssl at http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:054

For Slackware Linux:
Upgrade to the latest mod_ssl package, as listed in slackware-security Mailing List, Wed, 2 Jun 2004 12:24:39 -0700 (PDT) at http://slackware.com/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.583808

For Gentoo Linux Security:
Upgrade to the latest version of mod_ssl (2.8.18 or later), as listed in Gentoo Linux Security Advisory GLSA 200406-05 at http://www.linuxsecurity.com/advisories/gentoo_advisory-4458.html

For Trustix Secure Linux:
Upgrade to the latest apache package, as listed in Trustix Secure Linux Security Advisory #2004-0031 at http://www.linuxsecurity.com/advisories/trustix_advisory-4412.html

For OpenPKG:
Upgrade to the latest apache package, as listed in OpenPKG Security Advisory OpenPKG-SA-2004.026 at http://www.openpkg.org/security/OpenPKG-SA-2004.026-apache.html

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2004-0488 (CVE)
Related URL 10355 (SecurityFocus)
Related URL 16214 (ISS)