[NTLUG:Discuss] apache updates
Jay Urish
j at yourlinuxguru.com
Mon Jun 24 13:45:08 CDT 2002
At 01:22 PM 6/24/2002 -0500, you wrote:
>Jay, I'm going to apologize in advance for the long reply (apologize to
>everyone), but here is the email Mandrake sent out for their last security
>advisory:
no prob-- funny thing is that the scanner says 1.3.23 (what i'm running) is
vulnerable..
I don't have time for a major root compromise right now...
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>________________________________________________________________________
>
> Mandrake Linux Security Update Advisory
>________________________________________________________________________
>
>Package name: apache
>Advisory ID: MDKSA-2002:039-2
>Date: June 22md, 2002
>Original Advisory Date: June 20th, 2002
>Affected versions: 7.1, 7.2, 8.0, 8.1, 8.2, Corporate Server 1.0.1,
> Single Network Firewall 7.2
>________________________________________________________________________
>
>Problem Description:
>
> [ Please note that this advisory supersedes the previous MDKSA-2002:039
> and MDKSA-2002:039-1 advisories. ]
>
> MandrakeSoft is urging all users of Mandrake Linux to update their
> Apache installations immediately. What was previously thought to have
> been a DoS-only condition has now been proven to be more than that;
> exploitable conditions have been discovered on both 32bit and 64bit
> platforms. Successful exploitation of this vulnerability may lead to
> the execution of arbitary code on the server running a vulnerable
> Apache with the permissions of the web server child process (on
> Mandrake Linux this is the user "apache"). This can be used to exploit
> other vulnerabilities that are unrelated to Apache on the local system,
> and potentially allow the intruder root access.
>
> Thanks to Gobbles for proving that this exploitable condition exists.
> Because there are known exploits in the wild for some platforms, this
> update should be considered essential and should be performed
> immediately.
>
> All versions of Apache prior to 1.3.26 and 2.0.37 are vulnerable to
> this problem. MandrakeSoft has provided patched versions of Apache to
> correct this vulnerability.
>
> Also please note that these packages are no different than those
> provided in MDKSA-2002:039-1 so if you have already updated, there are
> no new packages to upgrade.
>________________________________________________________________________
>
>References:
>
> http://httpd.apache.org/info/security_bulletin_20020620.txt
> http://online.securityfocus.com/news/493
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0392
>________________________________________________________________________
More information about the Discuss
mailing list