TITLE: Apache mod_rewrite Off-By-One Buffer Overflow Vulnerability
SECUNIA ADVISORY ID: SA21197
VERIFY ADVISORY: http://secunia.com/advisories/21197/
CRITICAL: Moderately critical
IMPACT: DoS, System access
WHERE: >From remote
SOFTWARE: Apache 1.3.x -- http://secunia.com/product/72/
Apache 2.0.x -- http://secunia.com/product/73/
Apache 2.2.x -- http://secunia.com/product/9633/
DESCRIPTION: A vulnerability has been reported in Apache HTTP Server, which potentially can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused by a off-by-one error in mod_rewrite and can be exploited to cause a one-byte buffer overflow.
Successful exploitation may crash the web server process or allow execution of arbitrary code. However, this depends on the manner which Apache HTTP Server was compiled and also requires the following:
* Certain types of Rewrite rules are used where the beginning of the rewritten URL is controlled.
* The RewriteRule flags do not include the Forbidden (F), Gone (G), or NoEscape (NE) flag.
The vulnerability affects Apache 1.3 since 1.3.28, 2.0 since 2.0.46, and 2.2 since 2.2.0.
SOLUTION: Update to version 1.3.37, 2.0.59, or 2.2.3.
PROVIDED AND/OR DISCOVERED BY: The vendor credits Mark Dowd, McAfee Avert Labs.
ORIGINAL ADVISORY:
http://www.apache.org/dist/httpd/Announcement1.3.html
http://www.apache.org/dist/httpd/Announcement2.0.html
http://www.apache.org/dist/httpd/Announcement2.2.html
Apache mod_rewrite Off-By-One Buffer Overflow VulnerabilityPosted on Friday, July 28, 2006 @ 07:14:21 CDT in Security |