Korean
<< Back
VID 22267
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description Apache HTTP Server is vulnerable to a heap-based buffer overflow in the mod_proxy module.
The versions 1.3.26 through 1.3.31 of Apache HTTP Server contains a buffer overflow vulnerability that can allow a remote attacker to cause a denial of service attack or possibly execute arbitrary code. It's caused by a lack of verification on the Content-Length field.
By supplying a specially-crafted negative Content-Length value, a remote attacker could a denial of service or execute arbitrary code on the remote system via mod_proxy connect to a malicious server, which will return a invalid Content-Length value.

* Note: This check solely relied on the version number of the remote Apache server to assess this vulnerability, so this might be a false positive. If the Apache server has not loaded the mod_proxy module, please ignore this alert.

* References:
http://marc.theaimsgroup.com/?l=apache-httpd-dev&m=108687304202140
http://www.guninski.com/modproxy1.html

* Platforms Affected:
Apache HTTP Server 1.3.26 to 1.3.31
Debian Linux 3.0
Gentoo Linux Any version
OpenPKG 1.3, 2.0, CURRENT
Red Hat Advanced Workstation 2.1AS, Enterprise Linux 2.1AS, 2.1ES, 2.1WS
Any operating system Any version
Recommendation For Red Hat Linux:
Upgrade to the latest Apache package, as listed in Red Hat Security Advisory RHSA-2004:245-14 at https://rhn.redhat.com/errata/RHSA-2004-245.html

For OpenPKG:
Upgrade to the latest Apache package, as listed in OpenPKG Security Advisory OpenPKG-SA-2004.029-apache at http://www-1.ibm.com/services/continuity/recover1.nsf/mss/MSS-OAR-E01-2004.0808.1

For Debian GNU/Linux 3.0 (woody):
Upgrade to the latest Apache package (1.3.26-0woody5 or later), as listed in Debian Security Advisory DSA-525-1 at http://www.debian.org/security/2004/dsa-525

For Gentoo Linux Security:
Upgrade to the latest version of Apache (1.3.31-r2 or later), as listed in Gentoo Linux Security Advisory GLSA 200406-16 at http://www.linuxsecurity.com/advisories/gentoo_advisory-4515.html

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2004-0492 (CVE)
Related URL 10508 (SecurityFocus)
Related URL 16387 (ISS)