`

---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Security Advisory

Synopsis:          Stronghold: Chunked encoding vulnerability in Apache
Advisory ID:       RHSA-2002:118-06
Issue date:        2002-06-20
Updated on:        2002-06-20
Product:           Stronghold Cross Platform
Keywords:          apache chunked encoding DoS
Cross references:  
Obsoletes:         
CVE Names:         CAN-2002-0392
---------------------------------------------------------------------

1. Topic:

The Apache Web server contains a security vulnerability which can be used
to launch a denial of service attack, or in some cases, allow remote code
execution.

2. Relevant releases/architectures:



3. Problem description:

Versions of the Apache Web server up to and including 1.3.24 contain a bug
in the routines which deal with requests encoded using "chunked" encoding.
A carefully crafted invalid request can cause an Apache child process to
call the memcpy() function in a way that will write past the end of its
buffer, corrupting the stack.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2002-0392 to this issue.

Due to the nature of the overflow on 32-bit Unix platforms this will most
likely cause a segmentation violation and the child will terminate. 
However on some 64-bit platforms and some 32-bit platforms it is likely
that it is further exploitable. This could allow arbitrary code to be run
on the server as the user the Apache children are set to run as.

All users of Stronghold are advised to patch or upgrade their servers
4. Solution:

We have backported the security fix from the official Apache 1.3.26
release.  The patch and instructions on how to apply it are available 
from the Stronghold resource center at  

Stronghold 3:    Hat.com/sh3/errata-2002-118

Stronghold 4:    Hat.com/sh4/errata-2002-118 Updated packages will also be made available shortly from the same URLs

5. Bug IDs fixed  (  for more info):



6. RPMs required:



7. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
 

These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at:
     About

You can verify each package with the following command:
    rpm --checksig  

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    rpm --checksig --nogpg 

8. References:
 
apache 
  Hat.com/sh3/errata-2002-118 
  Hat.com/sh4/errata-2002-118 
CVE -CVE-2002-0392



Copyright(c) 2000, 2001, 2002 Red Hat, Inc.





`

RedHat: Stronghold: 'apache' Denial of Service vulnerability

The Apache Web server contains a security vulnerability which can be usedto launch a denial of service attack, or in some cases, allow remote codeexecution.

Summary



Summary

Versions of the Apache Web server up to and including 1.3.24 contain a bugin the routines which deal with requests encoded using "chunked" encoding.A carefully crafted invalid request can cause an Apache child process tocall the memcpy() function in a way that will write past the end of itsbuffer, corrupting the stack.The Common Vulnerabilities and Exposures project (cve.mitre.org) hasassigned the name CAN-2002-0392 to this issue.Due to the nature of the overflow on 32-bit Unix platforms this will mostlikely cause a segmentation violation and the child will terminate. However on some 64-bit platforms and some 32-bit platforms it is likelythat it is further exploitable. This could allow arbitrary code to be runon the server as the user the Apache children are set to run as.All users of Stronghold are advised to patch or upgrade their servers


Solution

We have backported the security fix from the official Apache 1.3.26 release. The patch and instructions on how to apply it are available from the Stronghold resource center at
Stronghold 3: Hat.com/sh3/errata-2002-118
Stronghold 4: Hat.com/sh4/errata-2002-118 Updated packages will also be made available shortly from the same URLs
5. Bug IDs fixed ( for more info):


6. RPMs required:


7. Verification:
MD5 sum Package Name

These packages are GPG signed by Red Hat, Inc. for security. Our key is available at: About
You can verify each package with the following command: rpm --checksig
If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command: rpm --checksig --nogpg

References

apache Hat.com/sh3/errata-2002-118 Hat.com/sh4/errata-2002-118 CVE -CVE-2002-0392 Copyright(c) 2000, 2001, 2002 Red Hat, Inc. `

Package List


Severity
Advisory ID: RHSA-2002:118-06
Issued Date: : 2002-06-20
Updated on: 2002-06-20
Product: Stronghold Cross Platform
Keywords: apache chunked encoding DoS
Cross references:
Obsoletes:
CVE Names: CAN-2002-0392

Topic


Topic

The Apache Web server contains a security vulnerability which can be used

to launch a denial of service attack, or in some cases, allow remote code

execution.


 

Relevant Releases Architectures


Bugs Fixed


Related News