🚀 go-pugleaf

RetroBBS NetNews Server

Inspired by RockSolid Light RIP Retro Guy

Thread View: gmane.comp.apache.apacheweek
1 messages
1 total messages Started by Apache Week Fri, 04 Apr 2003 17:06
Apache Week issue 324
#37
Author: Apache Week
Date: Fri, 04 Apr 2003 17:06
170 lines
8492 bytes
                                APACHE WEEK

The essential weekly guide for users of the world's most popular Web server.
                         Issue 324: 4th April 2003

                                 In this issue

     * Security Reports
     * In the news
     * Apache 2.0.45 Released

                               Security Reports

     This  week  a  number  of  security issues have been announced that
     affect versions of the Apache httpd server.
     * Apache  versions before Apache 2.0.45 have a significant Denial of
       Service  vulnerability. This issue only affects versions of Apache
       2.0.  Even  though  fixes  for this issue appear in the new Apache
       2.0.45  release,  specific details of this vulnerability are being
       withheld until April 8th. The Common Vulnerabilities and Exposures
       project has assigned the name [1]CAN-2003-0132 to this issue.
     * Apache  on OS/2 up to and including Apache 2.0.45 have a Denial of
       Service  vulnerability.  Full  details have not yet been released,
       but it is likely that any OS/2 binaries released for Apache 2.0.45
       will  already  contain  the  fix.  The  Common Vulnerabilities and
       Exposures  project  has assigned the name [2]CAN-2003-0134 to this
       issue.

     [3]A  report  sent  to  the Bugtraq mailing list last month found a
     number  of  issues  where  terminal emulator software can be abused
     when  untrusted  data is displayed. One source of untrusted data is
     log  files,  and  although  certain  versions  of Apache 1.3 filter
     escape  sequences  from  access  log files, no filtering is done on
     error log files or Apache 2.0 access log files:
     * Apache  1.3  up  to  and including 1.3.25 and Apache 2.0 up to and
       including  2.0.45  do  not  filter  terminal escape sequences from
       access  logs,  which  could make it easier for attackers to insert
       those sequences into terminal emulators containing vulnerabilities
       related  to  escape  sequences.  The  Common  Vulnerabilities  and
       Exposures  project  has assigned the name [4]CAN-2003-0083 to this
       issue.
     * Apache  1.3  and  Apache  2.0 (all versions to date) do not filter
       terminal  escape  sequences  from  error logs, which could make it
       easier  for  attackers  to  insert  those  sequences into terminal
       emulators  containing vulnerabilities related to escape sequences.
       The  Common Vulnerabilities and Exposures project has assigned the
       name [5]CAN-2003-0020 to this issue.

                                  In the news

     A   number   of   news   sources   report   that  Oracle's  Ellison
     [6]anticipates the death of Windows. Larry Ellison, head of Oracle,
     asserted  that Microsoft had already had its web server "killed" by
     Apache.   He   said  Microsoft's  Web  server  offering  had  been,
     "slaughtered,   wiped   out,   taken   from   market  dominance  to
     irrelevance".

     This  history  of the events is a little inaccurate however, as the
     Apache  Web  server  was  first  announced in February 1995, a year
     before  Microsoft  IIS  1.0  [7]was  even  released. The Apache web
     server  has always been dominant, having a higher market share than
     IIS according to surveys such as the monthly [8]Netcraft report.

                            Apache 2.0.45 Released

     Apache 2.0.45 was released on 2^nd April 2003 and is now the latest
     version  of the Apache 2.0 server. The previous release was 2.0.44,
     released  on  the 21^st January 2003. [9]See what was new in Apache
     2.0.44.

     [10]Apache 2.0.45 is available for download.

     This  is  a  security,  bug  fix  and minor upgrade release. Due to
     security  issues,  any  sites using versions prior to Apache 2.0.45
     should  upgrade  to  Apache  2.0.45.  [11]Read more about the other
     security issues that affect Apache 2.0.

Security issues

     * Apache 2.0 versions before Apache 2.0.45 have a significant Denial
       of   Service   vulnerability.   The   specific   details  of  this
       vulnerability  are  being  withheld  until  April  8th. The Common
       Vulnerabilities  and  Exposures  project  has  assigned  the  name
       [12]CAN-2003-0132 to this issue.
     * Apache  2.0 versions between 2.0.21 and 2.0.44 inclusive leak some
       file descriptors to child processes such as CGI scripts, which can
       allow  the  CGI  script  greater  control  over the server than is
       necessary. [13]BZ#17206

Bugs fixed

     The  following bugs were found in Apache 2.0.44 and have been fixed
     in Apache 2.0.45:
     * mod_rewrite:  several  fixes  for  path  handling,  especially  on
       non-Unix  platforms  ([14]BZ#12902);  prevent  infinite  loops  in
       internal redirects ([15]BZ#17462); prevent mod_proxy from escaping
       URLs proxied by a rewrite rule
     * mod_file_cache: several segfault fixes. ([16]BZ#16313)
     * Several    fixes    for    mod_ldap's   result   caching   support
       ([17]BZ#12757); also added support for character set conversion to
       mod_auth_ldap
     * Fixes  for  potential  memory  leaks  and  filtering  problems  in
       mod_deflate ([18]BZ#16046, [19]BZ#16134, [20]BZ#14451)
     * mod_ssl:  fix SSLMutex to allow selecting lock type ([21]BZ#8122);
       fixes  for 64-bit platforms; fix the SSLCertificateChain directive
       to not skip the first certificate ([22]BZ#14560)
     * Win32 specific: avoid consuming CPU cycles under load; fixed piped
       access log
     * apachectl fixes for use of ulimit on Tru64 and AIX
     * Several   fixes   to   handle   misconfigurations   more  robustly
       ([23]BZ#17093, [24]BZ#9076)
     * A   fix   for   mod_auth_digest,  which  could  produce  incorrect
       authentication    challenges   on   non-Unix   platforms   if   an
       AuthDigestDomain directive was not used ([25]BZ#16937)

New features

     * An RPM .spec file is now included
     * mod_deflate  supports configurable compression level, and accurate
       logging of input and output bytes
     * The  CGI  modules  will  now log diagnostic information for common
       errors  encountered  when executing scripts (such as a permissions
       problem)
       ______________________________________________________________

     This issue brought to you by: Mark J Cox, Joe Orton
     Comments or criticisms? Please email us at
     [26]editors@apacheweek.com.

     [27]Apache Week is Copyright 2003 [28]Red Hat, Inc.

References

   1. http://cve.mitre.org/cgi-bin/cvename.cgi?nameÊN-2003-0132
   2. http://cve.mitre.org/cgi-bin/cvename.cgi?nameÊN-2003-0134
   3. http://marc.theaimsgroup.com/?l=bugtraq&m4612710031920&q=raw
   4. http://cve.mitre.org/cgi-bin/cvename.cgi?nameÊN-2003-0083
   5. http://cve.mitre.org/cgi-bin/cvename.cgi?nameÊN-2003-0020
   6. http://www.theinquirer.net/?article†76
   7. http://windows.about.com/library/history/blhistory1996.htm
   8. http://www.netcraft.co.uk/
   9. http://www.apacheweek.com/features/apache2044
  10. http://httpd.apache.org/download.cgi
  11. http://www.apacheweek.com/features/security-20
  12. http://cve.mitre.org/cgi-bin/cvename.cgi?nameÊN-2003-0132
  13. http://nagoya.apache.org/bugzilla/show_bug.cgi?id206
  14. http://nagoya.apache.org/bugzilla/show_bug.cgi?id902
  15. http://nagoya.apache.org/bugzilla/show_bug.cgi?id462
  16. http://nagoya.apache.org/bugzilla/show_bug.cgi?id313
  17. http://nagoya.apache.org/bugzilla/show_bug.cgi?id757
  18. http://nagoya.apache.org/bugzilla/show_bug.cgi?id046
  19. http://nagoya.apache.org/bugzilla/show_bug.cgi?id134
  20. http://nagoya.apache.org/bugzilla/show_bug.cgi?id451
  21. http://nagoya.apache.org/bugzilla/show_bug.cgi?id22
  22. http://nagoya.apache.org/bugzilla/show_bug.cgi?id560
  23. http://nagoya.apache.org/bugzilla/show_bug.cgi?id093
  24. http://nagoya.apache.org/bugzilla/show_bug.cgi?id76
  25. http://nagoya.apache.org/bugzilla/show_bug.cgi?id937
  26. mailto:editors@apacheweek.com
  27. http://www.apacheweek.com/
  28. http://www.redhat.com/

----------------------------------------------------------------------
To unsubscribe: https://listman.redhat.com/mailman/listinfo/apacheweek
or send the message   "unsubscribe"  to  apacheweek-request@redhat.com
----------------------------------------------------------------------



Thread Navigation

This is a paginated view of messages in the thread with full content displayed inline.

Messages are displayed in chronological order, with the original post highlighted in green.

Use pagination controls to navigate through all messages in large threads.

Back to All Threads