DSA-135-1 libapache-mod-ssl -- buffer overflow / DoS

Related Vulnerabilities: CVE-2002-0653  

The libapache-mod-ssl package provides SSL capability to the apache webserver. Recently, a problem has been found in the handling of .htaccess files, allowing arbitrary code execution as the web server user (regardless of ExecCGI / suexec settings), DoS attacks (killing off apache children), and allowing someone to take control of apache child processes - all through specially crafted .htaccess files. This has been fixed in the libapache-mod-ssl_2.4.10-1.3.9-1potato2 package (for potato), and the libapache-mod-ssl_2.8.9-2 package (for woody). We recommend you upgrade as soon as possible.

Debian Security Advisory

DSA-135-1 libapache-mod-ssl -- buffer overflow / DoS

Date Reported:
02 Jul 2002
Affected Packages:
libapache-mod-ssl
Vulnerable:
Yes
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 5084.
In Mitre's CVE dictionary: CVE-2002-0653.
More information:

The libapache-mod-ssl package provides SSL capability to the apache webserver. Recently, a problem has been found in the handling of .htaccess files, allowing arbitrary code execution as the web server user (regardless of ExecCGI / suexec settings), DoS attacks (killing off apache children), and allowing someone to take control of apache child processes - all through specially crafted .htaccess files.

This has been fixed in the libapache-mod-ssl_2.4.10-1.3.9-1potato2 package (for potato), and the libapache-mod-ssl_2.8.9-2 package (for woody). We recommend you upgrade as soon as possible.

Fixed in:

Debian GNU/Linux 2.2 (potato)

Source:
http://security.debian.org/pool/updates/main/liba/libapache-mod-ssl/libapache-mod-ssl_2.4.10-1.3.9-1potato2.dsc
MD5 checksum: 5b2cb207ba8214f52ffbc28836dd8dc4
http://security.debian.org/pool/updates/main/liba/libapache-mod-ssl/libapache-mod-ssl_2.4.10-1.3.9-1potato2.diff.gz
MD5 checksum: 29eef2b3307f00d92eb425ac669dabec
http://security.debian.org/pool/updates/main/liba/libapache-mod-ssl/libapache-mod-ssl_2.4.10-1.3.9.orig.tar.gz
MD5 checksum: cb0f2e07065438396f0d5df403dd2c16
Architecture-independent component:
http://security.debian.org/pool/updates/main/liba/libapache-mod-ssl/libapache-mod-ssl-doc_2.4.10-1.3.9-1potato2_all.deb
MD5 checksum: ebd8154f614e646b3a12980c8db606b6
alpha (DEC Alpha):
http://security.debian.org/pool/updates/main/liba/libapache-mod-ssl/libapache-mod-ssl_2.4.10-1.3.9-1potato2_alpha.deb
MD5 checksum: a3d73598e692b9c0bb945a52a00a363c
arm (ARM):
http://security.debian.org/pool/updates/main/liba/libapache-mod-ssl/libapache-mod-ssl_2.4.10-1.3.9-1potato2_arm.deb
MD5 checksum: 11e1085504430cacadd0255a0743b80a
i386 (Intel ia32):
http://security.debian.org/pool/updates/main/liba/libapache-mod-ssl/libapache-mod-ssl_2.4.10-1.3.9-1potato2_i386.deb
MD5 checksum: a1fd7d6a7ef3506ee0f94e56735d3d08
powerpc (PowerPC):
http://security.debian.org/pool/updates/main/liba/libapache-mod-ssl/libapache-mod-ssl_2.4.10-1.3.9-1potato2_powerpc.deb
MD5 checksum: 0f01742c2a77f2728baea4e1e9ad7ff0
sparc (Sun SPARC/UltraSPARC):
http://security.debian.org/pool/updates/main/liba/libapache-mod-ssl/libapache-mod-ssl_2.4.10-1.3.9-1potato2_sparc.deb
MD5 checksum: 4982a209adc93acbf50a650a3569d217

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/liba/libapache-mod-ssl/libapache-mod-ssl_2.8.9-2.dsc
MD5 checksum: 7cce5c97bd3cf35c8782d54a25138165
http://security.debian.org/pool/updates/main/liba/libapache-mod-ssl/libapache-mod-ssl_2.8.9-2.diff.gz
MD5 checksum: fc9f20e6d3bece6f0d3bad067c61d56a
Architecture-independent component:
http://security.debian.org/pool/updates/main/liba/libapache-mod-ssl/libapache-mod-ssl-doc_2.8.9-2_all.deb
MD5 checksum: 541257e99c523141625f5fc43fb3dec4
alpha (DEC Alpha):
http://security.debian.org/pool/updates/main/liba/libapache-mod-ssl/libapache-mod-ssl_2.8.9-2_alpha.deb
MD5 checksum: 712e406d8be713047f3e46bbf58269a5
arm (ARM):
http://security.debian.org/pool/updates/main/liba/libapache-mod-ssl/libapache-mod-ssl_2.8.9-2_arm.deb
MD5 checksum: 8ce3d4d45f45423a6c6b7d795c319d33
i386 (intel ia32):
http://security.debian.org/pool/updates/main/liba/libapache-mod-ssl/libapache-mod-ssl_2.8.9-2_i386.deb
MD5 checksum: 06733dc49c228230e5713f34eae7f8b0 m68k architecture
http://security.debian.org/pool/updates/main/liba/libapache-mod-ssl/libapache-mod-ssl_2.8.9-2_m68k.deb
MD5 checksum: e5a8518aac6d08bb5e9cc50195d336e3 mips architecture
http://security.debian.org/pool/updates/main/liba/libapache-mod-ssl/libapache-mod-ssl_2.8.9-2_mips.deb
MD5 checksum: dde883d6ee72f3b29fc324d9cb497670 mipsel architecture
http://security.debian.org/pool/updates/main/liba/libapache-mod-ssl/libapache-mod-ssl_2.8.9-2_mipsel.deb
MD5 checksum: a80756857248358c7973a5b0fb9372e2
powerpc (PowerPC):
http://security.debian.org/pool/updates/main/liba/libapache-mod-ssl/libapache-mod-ssl_2.8.9-2_powerpc.deb
MD5 checksum: 715876a54ddddf1e17e4c2ec9d2f5eea
s390 (S390):
http://security.debian.org/pool/updates/main/liba/libapache-mod-ssl/libapache-mod-ssl_2.8.9-2_s390.deb
MD5 checksum: 1a31f564ceba0ca82d9892d023caffd0

MD5 checksums of the listed files are available in the original advisory.