LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: December 19th, 2014
Linux Advisory Watch: December 12th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: Subject: [Security Announce] [ MDVSA-2009:131-1 ] apr-util Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake Multiple security vulnerabilities has been identified and fixed in apr-util: The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, related to an underflow flaw. (CVE-2009-0023). The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564 (CVE-2009-1955). Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input (CVE-2009-1956). The updated packages have been patched to prevent this. Update: Fixed packages for CS3 and MNF2 was missing with the last update.
 _______________________________________________________________________

 Mandriva Linux Security Advisory                       MDVSA-2009:131-1
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : apr-util
 Date    : June 6, 2009
 Affected: Corporate 3.0, Multi Network Firewall 2.0
 _______________________________________________________________________

 Problem Description:

 Multiple security vulnerabilities has been identified and fixed
 in apr-util:
 
 The apr_strmatch_precompile function in strmatch/apr_strmatch.c in
 Apache APR-util before 1.3.5 allows remote attackers to cause a denial
 of service (daemon crash) via crafted input involving (1) a .htaccess
 file used with the Apache HTTP Server, (2) the SVNMasterURI directive
 in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2
 module for the Apache HTTP Server, or (4) an application that uses
 the libapreq2 library, related to an underflow flaw. (CVE-2009-0023).
 
 The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in
 Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn
 modules in the Apache HTTP Server, allows remote attackers to
 cause a denial of service (memory consumption) via a crafted XML
 document containing a large number of nested entity references, as
 demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564
 (CVE-2009-1955).
 
 Off-by-one error in the apr_brigade_vprintf function in Apache APR-util
 before 1.3.5 on big-endian platforms allows remote attackers to obtain
 sensitive information or cause a denial of service (application crash)
 via crafted input (CVE-2009-1956).
 
 The updated packages have been patched to prevent this.

 Update:

 Fixed packages for CS3 and MNF2 was missing with the last update.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956
 _______________________________________________________________________

 Updated Packages:

 Corporate 3.0:
 6438073fa2571cedb2edcb8a695bda16  corporate/3.0/i586/apache2-2.0.48-6.20.C30mdk.i586.rpm
 12e8afeabb65ea4abf905524fd61b343  corporate/3.0/i586/apache2-common-2.0.48-6.20.C30mdk.i586.rpm
 4eadd42fb186a26d786d25362533e82a  corporate/3.0/i586/apache2-devel-2.0.48-6.20.C30mdk.i586.rpm
 832d9dbd5600782a929b71bd7e6f61bb  corporate/3.0/i586/apache2-manual-2.0.48-6.20.C30mdk.i586.rpm
 750c02cf0859b7b317f124c5107a5b07  corporate/3.0/i586/apache2-mod_cache-2.0.48-6.20.C30mdk.i586.rpm
 9ed613802d3e5f8fc088b8465428f1d9  corporate/3.0/i586/apache2-mod_dav-2.0.48-6.20.C30mdk.i586.rpm
 9030c9382a9d4d3020b8fd815cbabaa7  corporate/3.0/i586/apache2-mod_deflate-2.0.48-6.20.C30mdk.i586.rpm
 8e98aa19ce3197ae31f870c84402e1ea  corporate/3.0/i586/apache2-mod_disk_cache-2.0.48-6.20.C30mdk.i586.rpm
 97233182b774c4350d05e4e7422aca65  corporate/3.0/i586/apache2-mod_file_cache-2.0.48-6.20.C30mdk.i586.rpm
 40e47234eb2605375c5fc717659e0eae  corporate/3.0/i586/apache2-mod_ldap-2.0.48-6.20.C30mdk.i586.rpm
 80dfaf750009361fe621c594bec5efb7  corporate/3.0/i586/apache2-mod_mem_cache-2.0.48-6.20.C30mdk.i586.rpm
 6573645bbb414f59115229207305a3f3  corporate/3.0/i586/apache2-mod_proxy-2.0.48-6.20.C30mdk.i586.rpm
 612e933acc767970ecdf1f23e62c2ebf  corporate/3.0/i586/apache2-mod_ssl-2.0.48-6.20.C30mdk.i586.rpm
 dc00610fd6633f63f891c5f768a22acd  corporate/3.0/i586/apache2-modules-2.0.48-6.20.C30mdk.i586.rpm
 5241d3032ae49713e43d07d39fbbee04  corporate/3.0/i586/apache2-source-2.0.48-6.20.C30mdk.i586.rpm
 34d3d434bc723130e6e59049b5e3939a  corporate/3.0/i586/libapr0-2.0.48-6.20.C30mdk.i586.rpm 
 f048b454b9bf609c1cc7b13c413387d4  corporate/3.0/SRPMS/apache2-2.0.48-6.20.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 755b2e066f779fa9aad5f403335e1f75  corporate/3.0/x86_64/apache2-2.0.48-6.20.C30mdk.x86_64.rpm
 42bc30427c45df83d7a0fbb5bee60505  corporate/3.0/x86_64/apache2-common-2.0.48-6.20.C30mdk.x86_64.rpm
 783174aa020c5b14095087172bade395  corporate/3.0/x86_64/apache2-devel-2.0.48-6.20.C30mdk.x86_64.rpm
 4b54570bdb7f6aa29d370a9250a55450  corporate/3.0/x86_64/apache2-manual-2.0.48-6.20.C30mdk.x86_64.rpm
 9fb862a630cc2fdddf5aadffc73d8f03  corporate/3.0/x86_64/apache2-mod_cache-2.0.48-6.20.C30mdk.x86_64.rpm
 ce00089db719cc5fccf8c5ed614e0f86  corporate/3.0/x86_64/apache2-mod_dav-2.0.48-6.20.C30mdk.x86_64.rpm
 6c7ce93e4faf3910a4e37ecfb3aa6bcf  corporate/3.0/x86_64/apache2-mod_deflate-2.0.48-6.20.C30mdk.x86_64.rpm
 084c2310ae92da6d58f2c2d9748ef947  corporate/3.0/x86_64/apache2-mod_disk_cache-2.0.48-6.20.C30mdk.x86_64.rpm
 338bedc1f695ac29257f4fbbbae0e913  corporate/3.0/x86_64/apache2-mod_file_cache-2.0.48-6.20.C30mdk.x86_64.rpm
 429fcecf3fa53ec73c1c2082a06c8a7b  corporate/3.0/x86_64/apache2-mod_ldap-2.0.48-6.20.C30mdk.x86_64.rpm
 34b8969d6cdf063c24c3db5da60b66ed  corporate/3.0/x86_64/apache2-mod_mem_cache-2.0.48-6.20.C30mdk.x86_64.rpm
 b4ff66b59400e60406286db040351c46  corporate/3.0/x86_64/apache2-mod_proxy-2.0.48-6.20.C30mdk.x86_64.rpm
 e0fce8ab4362f1a40461af7cc1f388c0  corporate/3.0/x86_64/apache2-mod_ssl-2.0.48-6.20.C30mdk.x86_64.rpm
 6da81ad00ba8f7e6f35e18a81b79ecc4  corporate/3.0/x86_64/apache2-modules-2.0.48-6.20.C30mdk.x86_64.rpm
 3cef182192afb5a101aed6b824d9950a  corporate/3.0/x86_64/apache2-source-2.0.48-6.20.C30mdk.x86_64.rpm
 7b3b62b6b01d77c344a66b74f6fc92c0  corporate/3.0/x86_64/lib64apr0-2.0.48-6.20.C30mdk.x86_64.rpm 
 f048b454b9bf609c1cc7b13c413387d4  corporate/3.0/SRPMS/apache2-2.0.48-6.20.C30mdk.src.rpm

 Multi Network Firewall 2.0:
 dc646d83c4a17cd5253cad5627b27baf  mnf/2.0/i586/apache2-2.0.48-6.20.C30mdk.i586.rpm
 b3e5796e1c8b600153bb7760aa3c7c44  mnf/2.0/i586/apache2-common-2.0.48-6.20.C30mdk.i586.rpm
 0c1b528680931b0d0d62aed029c00cc2  mnf/2.0/i586/apache2-devel-2.0.48-6.20.C30mdk.i586.rpm
 3951d007d5ba03eec47465eaabfe3f23  mnf/2.0/i586/apache2-manual-2.0.48-6.20.C30mdk.i586.rpm
 8e55c40e40744a064882cd0fa4ef5cf0  mnf/2.0/i586/apache2-mod_cache-2.0.48-6.20.C30mdk.i586.rpm
 3f91a25523c535522cc84ff120fdc0ed  mnf/2.0/i586/apache2-mod_dav-2.0.48-6.20.C30mdk.i586.rpm
 f2b9e2ce65a8b9195befd7ac0250e6c4  mnf/2.0/i586/apache2-mod_deflate-2.0.48-6.20.C30mdk.i586.rpm
 6c612ca239c1e15ca44beea45802d2ca  mnf/2.0/i586/apache2-mod_disk_cache-2.0.48-6.20.C30mdk.i586.rpm
 1fe18f3beae65e236fc2ebb124fac665  mnf/2.0/i586/apache2-mod_file_cache-2.0.48-6.20.C30mdk.i586.rpm
 239baa6e2e43f7e4d8b68ba57d604f2c  mnf/2.0/i586/apache2-mod_ldap-2.0.48-6.20.C30mdk.i586.rpm
 0b90721f4df783807ad1a10608f6bab1  mnf/2.0/i586/apache2-mod_mem_cache-2.0.48-6.20.C30mdk.i586.rpm
 7f372005bb7420f976f2841f86c97397  mnf/2.0/i586/apache2-mod_proxy-2.0.48-6.20.C30mdk.i586.rpm
 41edbf29d8d04a4eb449b3c7970ac106  mnf/2.0/i586/apache2-mod_ssl-2.0.48-6.20.C30mdk.i586.rpm
 0173e0d347b2f8371cb2ebd8224e9953  mnf/2.0/i586/apache2-modules-2.0.48-6.20.C30mdk.i586.rpm
 2ce003b3977c10d3e88b2d6c1dad3f9b  mnf/2.0/i586/apache2-source-2.0.48-6.20.C30mdk.i586.rpm
 f4e5264b902bfb715cb473971f15919b  mnf/2.0/i586/libapr0-2.0.48-6.20.C30mdk.i586.rpm 
 8378e9f5191f581f69e6035c384a18d9  mnf/2.0/SRPMS/apache2-2.0.48-6.20.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.