| VID |
22297 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
The Apache HTTP server, according to its banner, has a Content-Length Buffer Overflow Vulnerability in 'mod_proxy' module. Apache HTTP Server versions 1.3.26 to 1.3.31 are vulnerable to a buffer overflow in 'mod_proxy' module, caused by a negative user-specified length value used in 'Content-Length' header. By issuing a specially-crafted negative Content-Length value, a remote attacker could cause the server to overflow a buffer, which would result in a Denial of Service or possibly code execution on the target system.
* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://www.ciac.org/ciac/bulletins/o-169.shtml http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0276.html http://www.osvdb.org/displayvuln.php?osvdb_id=6839
* Platforms Affected: Apache Software Foundation, Apache HTTP Server 1.3.26 to 1.3.31 Debian Linux 3.0 Gentoo Linux Any version HP-UX 11.04, Any version IBM HTTP Server 1.3.26, 1.3.28 Mandrake Linux 10.0, 9.1, 9.2, Corporate Server 2.1 OpenPKG 1.3, 2.0, CURRENT Red Hat Advanced Workstation 2.1AS Red Hat Enterprise Linux 2.1AS, 2.1ES, 2.1WS Solaris 8, 9 Any operating system Any version |
| Recommendation |
For Debian GNU/Linux 3.0 (woody), Upgrade to the latest apache package (1.3.26-0woody5 or later), as listed in Debian Security Advisory DSA-525-1 at http://www.debian.org/security/2004/dsa-525
For Gentoo Linux Security: Upgrade to the latest version of apache (1.3.31-r2 or later), as listed in Gentoo Linux Security Advisory GLSA 200406-16 at http://www.linuxsecurity.com/advisories/gentoo_advisory-4515.html
For HP-UX11.04: Upgrade to the version of apache, as listed in Hewlett-Packard Company Security Bulletin HPSBUX01057 at http://www-1.ibm.com/services/continuity/recover1.nsf/mss/MSS-OAR-E01-2004.0951.1
For Mandrake Linux: Upgrade to the latest apache package, as listed in MandrakeSoft Security Advisory MDKSA-2004:065 at http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:065
For OpenPKG: Upgrade to the latest apache package, as listed in OpenPKG Security Advisory OpenPKG-SA-2004.029-apache at http://www-1.ibm.com/services/continuity/recover1.nsf/mss/MSS-OAR-E01-2004.0808.1
For Red Hat Linux: Upgrade to the latest apache package, as listed in Red Hat Security Advisory RHSA-2004:245-14 at https://rhn.redhat.com/errata/RHSA-2004-245.html
For Sun Solaris: Apply the appropriate patch for your system, as listed in Sun Alert Notification 57628 at http://sunsolve.sun.com/search/document.do?assetkey=1-26-57628-1&searchclause=
For other distributions: Contact your vendor for upgrade or patch information. |
| Related URL |
CVE-2004-0492 (CVE) |
| Related URL |
10508 (SecurityFocus) |
| Related URL |
16387 (ISS) |
|