Login
Newsletter
Werbung

Sicherheit: Fehler in der Behandlung von Chunked Encoding in Apache
Aktuelle Meldungen Distributionen
Name: Fehler in der Behandlung von Chunked Encoding in Apache
ID: MDKSA-2002:039-2
Distribution: Mandrake
Plattformen: Mandrake 7.1, Mandrake 7.2, Mandrake Corporate Server 1.0.1, Mandrake 8.0, Mandrake Single Network Firewall 7.2, Mandrake 8.1, Mandrake 8.2
Datum: So, 23. Juni 2002, 13:00
Referenzen: Keine Angabe
Applikationen: Apache

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: apache
Advisory ID: MDKSA-2002:039-2
Date: June 22md, 2002
Original Advisory Date: June 20th, 2002
Affected versions: 7.1, 7.2, 8.0, 8.1, 8.2, Corporate Server 1.0.1,
Single Network Firewall 7.2
________________________________________________________________________

Problem Description:

[ Please note that this advisory supersedes the previous MDKSA-2002:039
and MDKSA-2002:039-1 advisories. ]

MandrakeSoft is urging all users of Mandrake Linux to update their
Apache installations immediately. What was previously thought to have
been a DoS-only condition has now been proven to be more than that;
exploitable conditions have been discovered on both 32bit and 64bit
platforms. Successful exploitation of this vulnerability may lead to
the execution of arbitary code on the server running a vulnerable
Apache with the permissions of the web server child process (on
Mandrake Linux this is the user "apache"). This can be used to
exploit
other vulnerabilities that are unrelated to Apache on the local system,
and potentially allow the intruder root access.

Thanks to Gobbles for proving that this exploitable condition exists.
Because there are known exploits in the wild for some platforms, this
update should be considered essential and should be performed
immediately.

All versions of Apache prior to 1.3.26 and 2.0.37 are vulnerable to
this problem. MandrakeSoft has provided patched versions of Apache to
correct this vulnerability.

Also please note that these packages are no different than those
provided in MDKSA-2002:039-1 so if you have already updated, there are
no new packages to upgrade.
________________________________________________________________________

References:

http://httpd.apache.org/info/security_bulletin_20020620.txt
http://online.securityfocus.com/news/493
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0392
________________________________________________________________________

Updated Packages:

Linux-Mandrake 7.1:
e88a36b186ed910b350ded94ecf017eb 7.1/RPMS/apache-1.3.22-10.1mdk.i586.rpm
084e29eb5ea8f07924bd3c3aaa62e166
7.1/RPMS/apache-common-1.3.22-10.1mdk.i586.rpm
99ee271be857848a76ee4e5ddba164db
7.1/RPMS/apache-devel-1.3.22-10.1mdk.i586.rpm
7419f968d50062a46fdb5c932a4e6a66
7.1/RPMS/apache-manual-1.3.22-10.1mdk.i586.rpm
a814f93494464cb1dc17ba363d128ade
7.1/RPMS/apache-mod_perl-1.3.22_1.26-2.1mdk.i586.rpm
8ad5af9470bf2efc5a9500c0ca0dc1f0
7.1/RPMS/apache-modules-1.3.22-10.1mdk.i586.rpm
fb6de8872a5f8e378df18f7867167202
7.1/RPMS/apache-source-1.3.22-10.1mdk.i586.rpm
6657b308799219bb0adcfd7339c3bacc
7.1/RPMS/mod_perl-common-1.3.22_1.26-2.1mdk.i586.rpm
f1ec2ba965c0217b346b9c43e2d9ec3f
7.1/RPMS/mod_perl-devel-1.3.22_1.26-2.1mdk.i586.rpm
f743e6702701f49ec7c7226663e94256
7.1/RPMS/HTML-Embperl-1.3.22_1.3.4-2.1mdk.i586.rpm
1ec9d40da21ba65855962c4b05b51f2f 7.1/SRPMS/apache-1.3.22-10.1mdk.src.rpm
4a21f924efa9b33df29b63838a0bd283
7.1/SRPMS/apache-mod_perl-1.3.22_1.26-2.1mdk.src.rpm

Linux-Mandrake 7.2:
cbcd89d798177d172cc380a870f93601 7.2/RPMS/apache-1.3.22-10.1mdk.i586.rpm
812a6720c2f5f87ba2e658898b4db982
7.2/RPMS/apache-common-1.3.22-10.1mdk.i586.rpm
47824b2d81b9fd3f2e89fa2a859fc7b0
7.2/RPMS/apache-devel-1.3.22-10.1mdk.i586.rpm
8646380d8ee739b07dedbe49037239e3
7.2/RPMS/apache-manual-1.3.22-10.1mdk.i586.rpm
c2cfc97d6808f7641453927fa6ab2138
7.2/RPMS/apache-mod_perl-1.3.22_1.26-2.1mdk.i586.rpm
f95cc26eda9c416cf5e2b871516329f9
7.2/RPMS/apache-modules-1.3.22-10.1mdk.i586.rpm
1722fd161613caaadaecf7c210c28964
7.2/RPMS/apache-source-1.3.22-10.1mdk.i586.rpm
885e426cee102583480d33af73d95410
7.2/RPMS/mod_perl-common-1.3.22_1.26-2.1mdk.i586.rpm
4ffdbd4779e52664f4cd10c9dc378333
7.2/RPMS/mod_perl-devel-1.3.22_1.26-2.1mdk.i586.rpm
0472c912f4eca60a286928914f7f1977
7.2/RPMS/HTML-Embperl-1.3.22_1.3.4-2.1mdk.i586.rpm
1ec9d40da21ba65855962c4b05b51f2f 7.2/SRPMS/apache-1.3.22-10.1mdk.src.rpm
4a21f924efa9b33df29b63838a0bd283
7.2/SRPMS/apache-mod_perl-1.3.22_1.26-2.1mdk.src.rpm

Mandrake Linux 8.0:
a841d196743ff8be5140155bf26b6c06 8.0/RPMS/apache-1.3.22-10.1mdk.i586.rpm
913417de276e1b3b7ca4987c844f690a
8.0/RPMS/apache-common-1.3.22-10.1mdk.i586.rpm
25fb2306bc4927196ba052dfc704b103
8.0/RPMS/apache-devel-1.3.22-10.1mdk.i586.rpm
18723219d012d68cf674e06787f667dd
8.0/RPMS/apache-manual-1.3.22-10.1mdk.i586.rpm
ad618ff45792c4f6d1e48220e802313d
8.0/RPMS/apache-mod_perl-1.3.22_1.26-2.1mdk.i586.rpm
8bc6da7fcf97d54512a567dc6cb8ccb1
8.0/RPMS/apache-modules-1.3.22-10.1mdk.i586.rpm
ae02827f90a4982f53554290deb66e67
8.0/RPMS/apache-source-1.3.22-10.1mdk.i586.rpm
6923fa950409e09bf5f4fc956060c098
8.0/RPMS/mod_perl-common-1.3.22_1.26-2.1mdk.i586.rpm
0f9a055653afe3fc42c9241a9016d6e0
8.0/RPMS/mod_perl-devel-1.3.22_1.26-2.1mdk.i586.rpm
bace2f60df56c7382e39422d32c30b0e
8.0/RPMS/HTML-Embperl-1.3.22_1.3.4-2.1mdk.i586.rpm
1ec9d40da21ba65855962c4b05b51f2f 8.0/SRPMS/apache-1.3.22-10.1mdk.src.rpm
4a21f924efa9b33df29b63838a0bd283
8.0/SRPMS/apache-mod_perl-1.3.22_1.26-2.1mdk.src.rpm

Mandrake Linux 8.0/ppc:
26133a7c9c93f567cb84810f656e952f ppc/8.0/RPMS/apache-1.3.22-10.1mdk.ppc.rpm
716c398ecc4afe5529f9a00c6fd177ef
ppc/8.0/RPMS/apache-common-1.3.22-10.1mdk.ppc.rpm
7c47e06cc5f746027f3097a9878a3303
ppc/8.0/RPMS/apache-devel-1.3.22-10.1mdk.ppc.rpm
7b18a419746effb8ffb71a82277d0332
ppc/8.0/RPMS/apache-manual-1.3.22-10.1mdk.ppc.rpm
aadc1eaa4f1d351f278e918cc984f550
ppc/8.0/RPMS/apache-mod_perl-1.3.22_1.26-2.1mdk.ppc.rpm
101422ece6691cf6c34ac775eabdbc7b
ppc/8.0/RPMS/apache-modules-1.3.22-10.1mdk.ppc.rpm
1592a59441a459b672aeebc0ed76eb02
ppc/8.0/RPMS/apache-source-1.3.22-10.1mdk.ppc.rpm
498c22b912ed1fddc35115fae2af672c
ppc/8.0/RPMS/mod_perl-common-1.3.22_1.26-2.1mdk.ppc.rpm
41f5918cc085da962429eae01c7264cd
ppc/8.0/RPMS/mod_perl-devel-1.3.22_1.26-2.1mdk.ppc.rpm
ef20447e4a837606656b993edfe38c7a
ppc/8.0/RPMS/HTML-Embperl-1.3.22_1.3.4-2.1mdk.ppc.rpm
1ec9d40da21ba65855962c4b05b51f2f ppc/8.0/SRPMS/apache-1.3.22-10.1mdk.src.rpm
4a21f924efa9b33df29b63838a0bd283
ppc/8.0/SRPMS/apache-mod_perl-1.3.22_1.26-2.1mdk.src.rpm

Mandrake Linux 8.1:
f01f2c68d9124e6e650fc06ff6db4a46 8.1/RPMS/apache-1.3.22-10.1mdk.i586.rpm
27783fc8be6747fb48abc10a3b0c77e2
8.1/RPMS/apache-common-1.3.22-10.1mdk.i586.rpm
1b6574c559c0f3161a8a73caddda146a
8.1/RPMS/apache-devel-1.3.22-10.1mdk.i586.rpm
f91416ba4dc54370f047b7bd45dace62
8.1/RPMS/apache-manual-1.3.22-10.1mdk.i586.rpm
40414ad27f48f9da4f0bf097acecdc4b
8.1/RPMS/apache-mod_perl-1.3.22_1.26-4.1mdk.i586.rpm
8209dc54e8880b56a5242d195942a3be
8.1/RPMS/apache-modules-1.3.22-10.1mdk.i586.rpm
417afb2d22aa7eae89ec469ea65d131c
8.1/RPMS/apache-source-1.3.22-10.1mdk.i586.rpm
5e745c184801f2a285740c8d7cf08b72
8.1/RPMS/mod_perl-common-1.3.22_1.26-4.1mdk.i586.rpm
79ffee5c0944f733977502b1c73add5a
8.1/RPMS/mod_perl-devel-1.3.22_1.26-4.1mdk.i586.rpm
861765252ed3a55d8070d5587f1c5a50
8.1/RPMS/HTML-Embperl-1.3.22_1.3.4-4.1mdk.i586.rpm
1ec9d40da21ba65855962c4b05b51f2f 8.1/SRPMS/apache-1.3.22-10.1mdk.src.rpm
5e559e9d0b701fc80aa78c65dbc57a04
8.1/SRPMS/apache-mod_perl-1.3.22_1.26-4.1mdk.src.rpm

Mandrake Linux 8.1/ia64:
c33afa1e5f7ea056cbd0ad933aef1a56 ia64/8.1/RPMS/apache-1.3.22-10.1mdk.ia64.rpm
184c43ed1e75453b3a62652156f7a132
ia64/8.1/RPMS/apache-common-1.3.22-10.1mdk.ia64.rpm
6cc2cfb6407648d2a9880da1d5993a78
ia64/8.1/RPMS/apache-devel-1.3.22-10.1mdk.ia64.rpm
562c6ab26a9d0f5324ab8abb8e4fc9f8
ia64/8.1/RPMS/apache-manual-1.3.22-10.1mdk.ia64.rpm
950d02262a7111b53b1832367344089d
ia64/8.1/RPMS/apache-mod_perl-1.3.22_1.26-4.1mdk.ia64.rpm
401219d5dc0efeec2aaf19965a67a94b
ia64/8.1/RPMS/apache-modules-1.3.22-10.1mdk.ia64.rpm
f7e7328bfe89c2050e70af3f676e1e28
ia64/8.1/RPMS/apache-source-1.3.22-10.1mdk.ia64.rpm
ae2566087bee798b3d5532b1c1ff2d5d
ia64/8.1/RPMS/mod_perl-common-1.3.22_1.26-4.1mdk.ia64.rpm
53aaeb8cbafce545f0fb4f2ae24145ce
ia64/8.1/RPMS/mod_perl-devel-1.3.22_1.26-4.1mdk.ia64.rpm
d8e950aec1b517d7e43dbeb13a92ca65
ia64/8.1/RPMS/HTML-Embperl-1.3.22_1.3.4-4.1mdk.ia64.rpm
1ec9d40da21ba65855962c4b05b51f2f ia64/8.1/SRPMS/apache-1.3.22-10.1mdk.src.rpm
5e559e9d0b701fc80aa78c65dbc57a04
ia64/8.1/SRPMS/apache-mod_perl-1.3.22_1.26-4.1mdk.src.rpm

Mandrake Linux 8.2:
d4b8e74109a6a9a06b77f4ca00703cb4 8.2/RPMS/apache-1.3.23-4.1mdk.i586.rpm
5d31265dfbaeadfbe1166c4724f9c25b
8.2/RPMS/apache-common-1.3.23-4.1mdk.i586.rpm
17bd94c4c80f8b9ce126f0b21bf961f0 8.2/RPMS/apache-devel-1.3.23-4.1mdk.i586.rpm
490f38b5a2151b2cc77c203ae34aa730
8.2/RPMS/apache-manual-1.3.23-4.1mdk.i586.rpm
4f3e54f01aca15c5df969a7064a4f9bd
8.2/RPMS/apache-mod_perl-1.3.23_1.26-5.1mdk.i586.rpm
7d95deff869faee09fe98c724e80f9ef
8.2/RPMS/apache-modules-1.3.23-4.1mdk.i586.rpm
f7d87a1c308557aa6239e7fcd9e81a79
8.2/RPMS/apache-source-1.3.23-4.1mdk.i586.rpm
f996109f1ac074cdd90e4edd13c252de
8.2/RPMS/mod_perl-common-1.3.23_1.26-5.1mdk.i586.rpm
07c6d444c12e46d4a1a316cd4515261f
8.2/RPMS/mod_perl-devel-1.3.23_1.26-5.1mdk.i586.rpm
a978089b6b0166f11fb7470106d4b411
8.2/RPMS/HTML-Embperl-1.3.23_1.3.4-5.1mdk.i586.rpm
d95c5a21cc4afa31842be448f3cb6706 8.2/SRPMS/apache-1.3.23-4.1mdk.src.rpm
d8cd1dcc8132f3fea8e5859b049cb4e0
8.2/SRPMS/apache-mod_perl-1.3.23_1.26-5.1mdk.src.rpm

Mandrake Linux 8.2/ppc:
5e704d302c63f04fafa1d638b05b727f ppc/8.2/RPMS/apache-1.3.23-4.1mdk.ppc.rpm
40b0cf509f1c61bdb7839b327bf24b11
ppc/8.2/RPMS/apache-common-1.3.23-4.1mdk.ppc.rpm
84baeef6cd679067e8ed749b695c91d0
ppc/8.2/RPMS/apache-devel-1.3.23-4.1mdk.ppc.rpm
d37d2b4f7025782f611d5e20df6b5189
ppc/8.2/RPMS/apache-manual-1.3.23-4.1mdk.ppc.rpm
3d5e185655df9bdc6606a21363862bdd
ppc/8.2/RPMS/apache-mod_perl-1.3.23_1.26-5.1mdk.ppc.rpm
c638e0fff62d6f6778d9a0fdd6d37d12
ppc/8.2/RPMS/apache-modules-1.3.23-4.1mdk.ppc.rpm
7a8212db2441bc3902e62633f081bb38
ppc/8.2/RPMS/apache-source-1.3.23-4.1mdk.ppc.rpm
afe9bac22898aec350365823574be78e
ppc/8.2/RPMS/mod_perl-common-1.3.23_1.26-5.1mdk.ppc.rpm
5c87d6fdd4c22b8a210a82310c6f8466
ppc/8.2/RPMS/mod_perl-devel-1.3.23_1.26-5.1mdk.ppc.rpm
31e1f7b4a7b4718527ebc3a4cb88f0ba
ppc/8.2/RPMS/perl-Apache-Session-1.54-2mdk.noarch.rpm
0ae8d78611012756b767181ff1236553
ppc/8.2/RPMS/HTML-Embperl-1.3.23_1.3.4-5.1mdk.ppc.rpm
d95c5a21cc4afa31842be448f3cb6706 ppc/8.2/SRPMS/apache-1.3.23-4.1mdk.src.rpm
d8cd1dcc8132f3fea8e5859b049cb4e0
ppc/8.2/SRPMS/apache-mod_perl-1.3.23_1.26-5.1mdk.src.rpm
d97cf098556de43b291ada4376a18fc3
ppc/8.2/SRPMS/perl-Apache-Session-1.54-2mdk.src.rpm

Corporate Server 1.0.1:
e88a36b186ed910b350ded94ecf017eb 1.0.1/RPMS/apache-1.3.22-10.1mdk.i586.rpm
084e29eb5ea8f07924bd3c3aaa62e166
1.0.1/RPMS/apache-common-1.3.22-10.1mdk.i586.rpm
99ee271be857848a76ee4e5ddba164db
1.0.1/RPMS/apache-devel-1.3.22-10.1mdk.i586.rpm
7419f968d50062a46fdb5c932a4e6a66
1.0.1/RPMS/apache-manual-1.3.22-10.1mdk.i586.rpm
a814f93494464cb1dc17ba363d128ade
1.0.1/RPMS/apache-mod_perl-1.3.22_1.26-2.1mdk.i586.rpm
8ad5af9470bf2efc5a9500c0ca0dc1f0
1.0.1/RPMS/apache-modules-1.3.22-10.1mdk.i586.rpm
fb6de8872a5f8e378df18f7867167202
1.0.1/RPMS/apache-source-1.3.22-10.1mdk.i586.rpm
6657b308799219bb0adcfd7339c3bacc
1.0.1/RPMS/mod_perl-common-1.3.22_1.26-2.1mdk.i586.rpm
f1ec2ba965c0217b346b9c43e2d9ec3f
1.0.1/RPMS/mod_perl-devel-1.3.22_1.26-2.1mdk.i586.rpm
f743e6702701f49ec7c7226663e94256
1.0.1/RPMS/HTML-Embperl-1.3.22_1.3.4-2.1mdk.i586.rpm
1ec9d40da21ba65855962c4b05b51f2f 1.0.1/SRPMS/apache-1.3.22-10.1mdk.src.rpm
4a21f924efa9b33df29b63838a0bd283
1.0.1/SRPMS/apache-mod_perl-1.3.22_1.26-2.1mdk.src.rpm

Single Network Firewall 7.2:
24f79880c17c12b1a0106c210e46ec9e snf7.2/RPMS/apache-1.3.20-5.1mdk.i586.rpm
2b8d3b2b0430b78a49fe172e72e7b5a1
snf7.2/RPMS/apache-common-1.3.20-5.1mdk.i586.rpm
d104f95454b1d28035db97df19a6460b
snf7.2/RPMS/apache-devel-1.3.20-5.1mdk.i586.rpm
7180b8f52e477f89a68bc27a220d3ab2
snf7.2/RPMS/apache-manual-1.3.20-5.1mdk.i586.rpm
d9768de21cd57c828deaa36c63839ba0
snf7.2/RPMS/apache-mod_perl-1.3.20_1.24-5.1mdk.i586.rpm
44f05723dc7d10eb6e5590e34b21ce9a
snf7.2/RPMS/apache-mod_perl-devel-1.3.20_1.24-5.1mdk.i586.rpm
dc20b172adaa53806cc055b1f8ffe50a
snf7.2/RPMS/apache-suexec-1.3.20-5.1mdk.i586.rpm
49e9f481c8cc83fff20309e0f24add2e
snf7.2/RPMS/HTML-Embperl-1.3b6-5.1mdk.i586.rpm
5be9ae334cabbd773f43719f2d54853f snf7.2/SRPMS/apache-1.3.20-5.1mdk.src.rpm
________________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):

________________________________________________________________________

To upgrade automatically, use MandrakeUpdate. The verification of md5
checksums and GPG signatures is performed automatically for you.

If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". A list of
FTP mirrors can be obtained from:

http://www.mandrakesecure.net/en/ftp.php

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package. You can do this with the command:

rpm --checksig <filename>

All packages are signed by MandrakeSoft for security. You can obtain
the GPG public key of the Mandrake Linux Security Team from:

https://www.mandrakesecure.net/RPM-GPG-KEYS

Please be aware that sometimes it takes the mirrors a few hours to
update.

You can view other update advisories for Mandrake Linux at:

http://www.mandrakesecure.net/en/advisories/

MandrakeSoft has several security-related mailing list services that
anyone can subscribe to. Information on these lists can be obtained by
visiting:

http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

security@linux-mandrake.com
________________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team
<security@linux-mandrake.com>


-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.0.7 (GNU/Linux)
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=yGlX
-----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE9FNi+mqjQ0CJFipgRAoShAJoCFOLHJV7Qrp3TbaTFjSsLTW7bLQCfZMe5
pOt+zlhH4PjFbQ604bi1d9k=
=Iq3W
-----END PGP SIGNATURE-----
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung