Korean
<< Back
VID 22297
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The Apache HTTP server, according to its banner, has a Content-Length Buffer Overflow Vulnerability in 'mod_proxy' module.
Apache HTTP Server versions 1.3.26 to 1.3.31 are vulnerable to a buffer overflow in 'mod_proxy' module, caused by a negative user-specified length value used in 'Content-Length' header. By issuing a specially-crafted negative Content-Length value, a remote attacker could cause the server to overflow a buffer, which would result in a Denial of Service or possibly code execution on the target system.

* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://www.ciac.org/ciac/bulletins/o-169.shtml
http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0276.html
http://www.osvdb.org/displayvuln.php?osvdb_id=6839

* Platforms Affected:
Apache Software Foundation, Apache HTTP Server 1.3.26 to 1.3.31
Debian Linux 3.0
Gentoo Linux Any version
HP-UX 11.04, Any version
IBM HTTP Server 1.3.26, 1.3.28
Mandrake Linux 10.0, 9.1, 9.2, Corporate Server 2.1
OpenPKG 1.3, 2.0, CURRENT
Red Hat Advanced Workstation 2.1AS
Red Hat Enterprise Linux 2.1AS, 2.1ES, 2.1WS
Solaris 8, 9
Any operating system Any version
Recommendation For Debian GNU/Linux 3.0 (woody),
Upgrade to the latest apache package (1.3.26-0woody5 or later), as listed in Debian Security Advisory DSA-525-1 at http://www.debian.org/security/2004/dsa-525

For Gentoo Linux Security:
Upgrade to the latest version of apache (1.3.31-r2 or later), as listed in Gentoo Linux Security Advisory GLSA 200406-16 at http://www.linuxsecurity.com/advisories/gentoo_advisory-4515.html

For HP-UX11.04:
Upgrade to the version of apache, as listed in Hewlett-Packard Company Security Bulletin HPSBUX01057 at http://www-1.ibm.com/services/continuity/recover1.nsf/mss/MSS-OAR-E01-2004.0951.1

For Mandrake Linux:
Upgrade to the latest apache package, as listed in MandrakeSoft Security Advisory MDKSA-2004:065 at http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:065

For OpenPKG:
Upgrade to the latest apache package, as listed in OpenPKG Security Advisory OpenPKG-SA-2004.029-apache at http://www-1.ibm.com/services/continuity/recover1.nsf/mss/MSS-OAR-E01-2004.0808.1

For Red Hat Linux:
Upgrade to the latest apache package, as listed in Red Hat Security Advisory RHSA-2004:245-14 at https://rhn.redhat.com/errata/RHSA-2004-245.html

For Sun Solaris:
Apply the appropriate patch for your system, as listed in Sun Alert Notification 57628 at http://sunsolve.sun.com/search/document.do?assetkey=1-26-57628-1&searchclause=

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2004-0492 (CVE)
Related URL 10508 (SecurityFocus)
Related URL 16387 (ISS)