🚀 go-pugleaf

RetroBBS NetNews Server

Inspired by RockSolid Light RIP Retro Guy

Thread View: gmane.comp.apache.apacheweek
1 messages
1 total messages Started by Apache Week Fri, 24 Jan 2003 17:45
Apache Week issue 319
#32
Author: Apache Week
Date: Fri, 24 Jan 2003 17:45
238 lines
11945 bytes
                                APACHE WEEK

The essential weekly guide for users of the world's most popular Web server.
                        Issue 319: 24th January 2003

                                 In this issue

     * Security Reports
     * In the news
     * Apache 2.0.44 Released
     * Featured articles

                               Security Reports

     This week a pair of security issues have been announced that affect
     Windows versions of the 2.0 Apache httpd server.
     * Apache  2.0  before  2.0.44  on  Windows  platforms  allows remote
       attackers to obtain different files to the ones they requested via
       an  HTTP  request that contains certain illegal characters such as
       <.
       As  an  example,  a file in the document root called "aa" would be
       returned by a request to Apache of http://www.example.com/fred/<a.
       This  issue  was  reported  to  the Apache Security Team by Lionel
       Brits  on  25th  November  2002.  The  Common  Vulnerabilities and
       Exposures  project  has assigned the name [1]CAN-2003-0017 to this
       issue.
     * Apache 2.0 before 2.0.44 on Windows platforms can be made to crash
       or in some cases execute arbitrary code by malicious requests that
       contain MS-DOS device names.
       Part  of  this  issue is not just limited to Apache, it is a known
       security  issue that various MS-DOS device names when accessed can
       cause  some  Windows  versions  to  crash. A [2]Microsoft security
       bulletin   contains  a  patch  that  should  also  be  applied  to
       vulnerable systems.
       This  issue  was  reported  to the Apache Security Team by Matthew
       Murphy  on  4th  December  2002.  The  Common  Vulnerabilities and
       Exposures  project  has assigned the name [3]CAN-2003-0016 to this
       issue.

     These  issues  have  both  been fixed in Apache 2.0.44 which is now
     available.  Windows  users  will  also need to apply a patch to get
     Apache  2.0.44  to  work  correctly  on their systems. The patch is
     [4]available for download and more information about the problem is
     available in [5]BZ#16288

                                  In the news

Cross-Site Tracing issues

     Earlier  this  week  a paper was published, [6]"Cross-Site Tracing"
     which  gave  details of how the TRACE HTTP request could be used in
     Cross-Site Scripting attacks. Unfortunately this issue has not been
     very  well  understood  by the media and has received a unwarranted
     amount of attention.

     When  an  HTTP  TRACE request is sent to a web server that supports
     it, that server will respond echoing the data that is passed to it,
     including  any  HTTP headers. The paper explains that some browsers
     can  be  scripted  to  perform a TRACE request. A browser with this
     functionality  could  be  made  to issue a TRACE request against an
     arbitrary  site  and  pass the results on elsewhere. Since browsers
     will only send authentication details and cookies to the sites that
     issue   them   this  means  a  user  having  a  browser  with  this
     functionality  could  be  tricked  into  sending  their  cookies or
     authentication details for arbitrary sites to an attacker.

     For  example,  if you visited a page that an attacker has carefully
     crafted,  the  page  could  cause  your  browser  to bounce a TRACE
     request  against  some  site  for  which  you  have  authentication
     cookies. The result of the TRACE will be a copy of what was sent to
     the   site,   which   will   therefore  include  those  cookies  or
     authentication  data. The carefully crafted page can then pass that
     information on to the attacker.

     TRACE  requests  can  be  disabled by making a change to the Apache
     server  configuration.  Unfortunately it is not possible to do this
     using  the  Limit  directive  since  the  processing  for the TRACE
     request  skips  this  authorisation checking. Instead the following
     lines can be added which make use of the mod_rewrite module.

RewriteEngine On
RewriteCond %{REQUEST_METHOD} ^TRACE
RewriteRule .* - [F]

     Although  the  particular  attack highlighted made use of the TRACE
     functionality   to   grab  authentication  details,  this  isn't  a
     vulnerability  in  TRACE,  or  in  the  Apache web server. The same
     browser functionality that permits the published attack can be used
     for  different  attacks even if TRACE is disabled on the remote web
     server.  For  example  an attacker could create a carefully crafted
     page  that  when visited submits a hidden request to some arbitrary
     site  through  your  browser, grabs the result and passes it to the
     attacker.

                            Apache 2.0.44 Released

     Apache  2.0.44  was  released  on 21^st January 2003 and is now the
     latest  version  of the Apache 2.0 server. The previous release was
     2.0.43,  released  on the 3^rd October 2002. [7]See what was new in
     Apache 2.0.43.

     [8]Apache 2.0.44 is available for download.

     This  is  a  security,  bug  fix  and minor upgrade release. Due to
     security issues, any sites using versions prior to Apache 2.0.44 on
     Windows  should  upgrade  to  Apache 2.0.44. [9]Read more about the
     other security issues that affect Apache 2.0.

Security issues

     * Apache  was vulnerable to a denial of service attack via a request
       for MS-DOS device name on Windows 9x and Me. [10]CAN-2003-0016
     * Apache  allowed  arbitrary code execution via crafted POST request
       containing MS-DOS device name on Windows 9x and Me.
     * Apache  could  be  forced  to  serve  unexpected  files on Windows
       platforms  by  appending  illegal  characters  such  as '<' to the
       request URL. [11]CAN-2002-0017

Bugs fixed

     The  following bugs were found in Apache 2.0.43 and have been fixed
     in Apache 2.0.44:
     * Allow escaping % sign in CustomLog format strings
     * mod_setenvif: fix BrowserMatchNoCase for non-regex patterns.
     * Return  appropriate MIME response headers for negotiated responses
       from a body embedded in a type-map
     * Prevent  416  "Range  not  satisfiable"  response  in  place  of a
       redirect
     * Prevent  files  being  left  open  for the duration of a keepalive
       connection, which could cause a "Too many open files" error
     * mod_ssl: several fixes for memory handling and leaks
     * mod_proxy:  fix  invalid  Content-Length from pages fetched during
       server-side include processing.
     * LDAP   modules:   ensure   correct   load   order   in  httpd.conf
       ([12]BZ#14256);  fix  compatibility  with Netscape LDAP libraries;
       fix Win32 build
     * mod_deflate:  fix  a memory leak when compressing dynamic content;
       always emit Vary headers
     * mod_isapi:   fix  several  compatibility  problems  ([13]BZ#14399,
       [14]BZ#10408),  and  fix bug which caused invalid responses or log
       entries ([15]BZ#10216)
     * CGI modules: fix streaming output from "nph-" scripts, for example
       CGI::IRC  ([16]BZ#8482);  fix  construction  of  command line from
       query  strings  ([17]BZ#13914), handle environment variables which
       contain newlines in mod_cgid ([18]BZ#14550); terminate CGI scripts
       when connection is dropped ([19]BZ#8388)
     * Caching  modules:  many bug fixes (including [20]BZ#14556), and an
       HTTP compliance fix ([21]BZ#14556)

New features

     * Add  an  --enable-v4-mapped  configure option to allow or disallow
       connections  from  IPv4-mapped  addresses  to  IPv6  addresses, on
       applicable platforms ([22]BZ#14037, [23]PR#7492)
     * Add IndexOptions IgnoreCase option to mod_autoindex ([24]BZ#14276)
     * Add  EnableSendfile  directive  to  disable use of sendfile() when
       necessary (for instance when serving an NFS share)
     * Add  ProxyBadHeader  directive to dictate handling of invalid HTTP
       responses headers
     * Add  SERVER_ADDR  keyword to mod_setenvif, to represent the server
       IP address for a particular request
     * Performance improvements
     * Add   -S   command-line   option   to   httpd,  equivalent  to  -t
       -DDUMP_VHOSTS

                               Featured articles

     In  this  section we highlight some of the articles on the web that
     are of interest to Apache users.

     [25]"Unifying  Web  Clusters  with  Spread" describes how Spread, a
     toolkit that provides a messaging service, can be used to implement
     distributed logging and to monitor applications running on many Web
     servers  easily.  The  Apache  module, mod_log_spread is an example
     where  Spread  is used to gather access logs for large web clusters
     into a single access log file.

     O'Reilly  ONLamp.com  shows you [26]how to configure and build your
     very  own  PHP 4.3 on Mac OS X. It provides a step-by-step guide on
     configuring PHP to enable additional extensions such as support for
     reading  and writing XML using the DOM, and communicating with LDAP
     servers,   and   other  parameters  for  a  basic  Apache  and  PHP
     installation.

     [27]"Security  with  PHP  Superglobals" explains the concept of PHP
     Superglobals  in  layman terms. It starts by discussing two methods
     for  submitting  data through web forms known as GET and POST. Then
     it looks at the problem of identifying the origins of the variables
     and how Superglobals attempt to solve this.
       ______________________________________________________________

     This issue brought to you by: Mark J Cox, Joe Orton, Min Min Tsan
     Comments or criticisms? Please email us at
     [28]editors@apacheweek.com.

     [29]Apache Week is Copyright 2003 [30]Red Hat, Inc.

References

   1. http://cve.mitre.org/cgi-bin/cvename.cgi?nameÊN-2003-0017
   2. http://www.microsoft.com/technet/Security/Bulletin/ms00-017.asp
   3. http://cve.mitre.org/cgi-bin/cvename.cgi?nameÊN-2003-0016
   4. http://httpd.apache.org/download.cgi
   5. http://nagoya.apache.org/bugzilla/show_bug.cgi?id288
   6. http://www.cgisecurity.com/whitehat-mirror/WH-WhitePaper_XST_ebook.pdf
   7. http://www.apacheweek.com/features/apache2043
   8. http://httpd.apache.org/download.cgi
   9. http://www.apacheweek.com/features/security-20
  10. http://cve.mitre.org/cgi-bin/cvename.cgi?nameÊN-2003-0016
  11. http://cve.mitre.org/cgi-bin/cvename.cgi?nameÊN-2002-0017
  12. http://nagoya.apache.org/bugzilla/show_bug.cgi?id256
  13. http://nagoya.apache.org/bugzilla/show_bug.cgi?id399
  14. http://nagoya.apache.org/bugzilla/show_bug.cgi?id408
  15. http://nagoya.apache.org/bugzilla/show_bug.cgi?id216
  16. http://nagoya.apache.org/bugzilla/show_bug.cgi?id„82
  17. http://nagoya.apache.org/bugzilla/show_bug.cgi?id914
  18. http://nagoya.apache.org/bugzilla/show_bug.cgi?id550
  19. http://nagoya.apache.org/bugzilla/show_bug.cgi?idƒ88
  20. http://nagoya.apache.org/bugzilla/show_bug.cgi?id556
  21. http://nagoya.apache.org/bugzilla/show_bug.cgi?id556
  22. http://nagoya.apache.org/bugzilla/show_bug.cgi?id037
  23. http://bugs.apache.org/index/full/7492
  24. http://nagoya.apache.org/bugzilla/show_bug.cgi?id276
  25. http://www.samag.com/documents/sw89/sam0302a/0302a.htm
  26. http://www.onlamp.com/pub/a/php/2003/01/17/phpcookbook.html
  27. http://www.linuxjournal.com/article.php?side59
  28. mailto:editors@apacheweek.com
  29. http://www.apacheweek.com/
  30. http://www.redhat.com/

----------------------------------------------------------------------
To unsubscribe: https://listman.redhat.com/mailman/listinfo/apacheweek
or send the message   "unsubscribe"  to  apacheweek-request@redhat.com
----------------------------------------------------------------------



Thread Navigation

This is a paginated view of messages in the thread with full content displayed inline.

Messages are displayed in chronological order, with the original post highlighted in green.

Use pagination controls to navigate through all messages in large threads.

Back to All Threads