LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 11-04-2003, 09:44 PM   #1
php
Member
 
Registered: Jun 2001
Location: USA
Distribution: Slackware
Posts: 827

Rep: Reputation: 30
Slackware Security Advisory


From: Slackware Security Team <security@slackware.com>
To: slackware-security@slackware.com
Subject: [slackware-security] apache security update (SSA:2003-308-01)
Date: Tue, 4 Nov 2003 16:48:11 -0800 (PST)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security] apache security update (SSA:2003-308-01)

Apache httpd is a hypertext transfer protocol server, and is used
by over two thirds of the Internet's web sites.

Upgraded Apache packages are available for Slackware 8.1, 9.0, 9.1,
and -current. These fix local vulnerabilities that could allow users
who can create or edit Apache config files to gain additional
privileges. Sites running Apache should upgrade to the new packages.

In addition, new mod_ssl packages have been prepared for all platforms,
and new PHP packages have been prepared for Slackware 8.1, 9.0, and
- -current (9.1 already uses PHP 4.3.3). In -current, these packages
also move the Apache module directory from /usr/libexec to
/usr/libexec/apache. Links for all of these related packages are
provided below.

More details about the Apache issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:

http://cve.mitre.org/cgi-bin/cvename...=CAN-2003-0542


Here are the details from the Slackware 9.1 ChangeLog:
+--------------------------+
Mon Nov 3 20:06:29 PST 2003
patches/packages/apache-1.3.29-i486-1.tgz: Upgraded to apache-1.3.29.
This fixes the following local security issue:
o CAN-2003-0542 (cve.mitre.org)
Fix buffer overflows in mod_alias and mod_rewrite which occurred if
one configured a regular expression with more than 9 captures.
This vulnerability requires the attacker to create or modify certain
Apache configuration files, and is not a remote hole. However, it could
possibly be used to gain additional privileges if access to the Apache
administrator account can be gained through some other means. All sites
running Apache should upgrade.
(* Security fix *)
+--------------------------+


WHERE TO FIND THE NEW PACKAGES:
+-----------------------------+

Updated packages for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackwar....29-i386-1.tgz
ftp://ftp.slackware.com/pub/slackwar....29-i386-1.tgz
ftp://ftp.slackware.com/pub/slackwar...3.3-i386-1.tgz

Updated packages for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackwar....29-i386-1.tgz
ftp://ftp.slackware.com/pub/slackwar....29-i386-1.tgz
ftp://ftp.slackware.com/pub/slackwar...3.3-i386-1.tgz

Updated packages for Slackware 9.1:
ftp://ftp.slackware.com/pub/slackwar....29-i486-1.tgz
ftp://ftp.slackware.com/pub/slackwar....29-i486-1.tgz

Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackwar....29-i486-1.tgz
ftp://ftp.slackware.com/pub/slackwar....29-i486-1.tgz
ftp://ftp.slackware.com/pub/slackwar...3.3-i486-3.tgz


MD5 SIGNATURES:
+-------------+

Slackware 8.1 packages:
1a8190a214c052f0707bd5a6b005a7cd apache-1.3.29-i386-1.tgz
eb74afbc99295c01d418b576e92e83bb mod_ssl-2.8.16_1.3.29-i386-1.tgz
b41a44c3ce2a3a09873b5d0930faf4c1 php-4.3.3-i386-1.tgz

Slackware 9.0 packages:
bb34ae622245f57bdca747ac5d8f73cf apache-1.3.29-i386-1.tgz
c84af5778a5667a06a60a274f2fe1edb mod_ssl-2.8.16_1.3.29-i386-1.tgz
7660e36f2cfb30cc339734369cca7719 php-4.3.3-i386-1.tgz

Slackware 9.1 packages:
9b494bb3f03cb4a4cb8c28f4fcc76666 apache-1.3.29-i486-1.tgz
938412e01daf55fee37293a5790d907f mod_ssl-2.8.16_1.3.29-i486-1.tgz

Slackware -current packages:
091c22d398c51fee820dd0d0b7d514e3 apache-1.3.29-i486-1.tgz
cd260439c9f1373329ba2224ace0451d mod_ssl-2.8.16_1.3.29-i486-1.tgz
cc90540cc07e840e5a0513ffbb308102 php-4.3.3-i486-3.tgz


INSTALLATION INSTRUCTIONS:
+------------------------+

First, stop apache:

# apachectl stop

Next, upgrade these packages as root:

# upgradepkg apache-1.3.29-i486-1.tgz
# upgradepkg mod_ssl-2.8.16_1.3.29-i486-1.tgz
# upgradepkg php-4.3.3-i486-3.tgz

Finally, restart apache:

# apachectl start

Or, if you're running a secure server with mod_ssl:

# apachectl startssl


+-----+
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Linux Advisory Watch: March 25th 2005 [from LinuxSecurity.com] t3gah Linux - Security 1 03-27-2005 12:37 AM
KDE Security Advisory: Konqueror Java Vulnerability C0NIk Linux - Security 0 12-21-2004 02:39 PM
OpenSSL Advisory: ASN.1 parsing vulnerabilities unSpawn Linux - Security 0 09-30-2003 07:33 PM
Red Hat advisory, update tcpdump neo77777 Linux - Security 1 04-10-2002 01:40 AM
Red Hat Security Advisory Aussie Linux - Security 0 02-28-2002 12:12 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 10:40 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration