Bug 50450 (CVE-2004-0113) - VUL-0: CVE-2004-0113: apache: 2 new security bugs
Summary: VUL-0: CVE-2004-0113: apache: 2 new security bugs
Status: RESOLVED DUPLICATE of bug 55611
: 51669 (view as bug list)
Alias: CVE-2004-0113
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: All Linux
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Thomas Biege
QA Contact: Security Team bot
URL:
Whiteboard: CVE-2004-0113: CVSS v2 Base Score: 5....
Keywords:
Depends on:
Blocks:
 
Reported: 2004-03-08 19:40 UTC by Thomas Biege
Modified: 2021-10-01 07:59 UTC (History)
2 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
patchinfo-box.apache2 (310 bytes, text/plain)
2004-03-11 18:37 UTC, Thomas Biege
Details
patchinfo.apache1 (374 bytes, text/plain)
2004-03-11 18:38 UTC, Thomas Biege
Details
proposed patch for 2.0.48 to fix unescaped errorlog problem (backport from 2.0.49) (4.44 KB, patch)
2004-03-24 01:43 UTC, Peter Poeml
Details | Diff
new patchinfo file for apache2 (807 bytes, text/plain)
2004-03-30 23:25 UTC, Peter Poeml
Details
patchinfo for apache1, typo corrected and CVE number added (480 bytes, text/plain)
2004-03-30 23:35 UTC, Peter Poeml
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Biege 2004-03-08 19:40:26 UTC
Hello Peter, 
the following hits us today: 
Date: Mon, 8 Mar 2004 10:16:21 +0000 
From: Joe Orton <jorton@redhat.com> 
To: vendor-sec@lst.de 
Subject: [vendor-sec] Two new Apache issues 
 
There are two new public Apache security issues (which were both 
reported through the bugzilla database): 
 
CAN-2004-0113 is a memory leak in Apache 2.0's mod_ssl which is 
triggered remotely and allows denial of service through memory 
consumption.  This issue does not affect mod_ssl for Apache 1.3; the fix 
is here: 
 
http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/ssl/
ssl_engine_io.c?r1=1.100.2.11&r2=1.100.2.12 
 
CAN-2003-0993 is a bug in mod_access's parsing of Allow/Deny directives 
which use an IP address without a netmask.  This is only known to affect 
big-endian 64-bit platforms; specifically it does not affect any 32-bit 
platforms, or any platforms where ntohl() always returns a 32-bit 
integer if passed a 64-bit long.  This issue does not affect Apache 2.0, 
the fix is here, credit this to Henning Brauer from OpenBSD: 
 
http://cvs.apache.org/viewcvs.cgi/apache-1.3/src/modules/standard/
mod_access.c?r1=1.46&r2=1.47 
 
There is also another public issue in the old Digest auth module for 
1.3, mod_digest (which is probably hardly used at all), the fix for 
which is still under development. 
 
Regards, 
 
joe 
_______________________________________________ 
Vendor Security mailing list 
Vendor Security@lst.de 
https://www.lst.de/cgi-bin/mailman/listinfo/vendor-sec
Comment 1 Thomas Biege 2004-03-08 19:40:26 UTC
<!-- SBZ_reproduce  -->
-
Comment 2 Thomas Biege 2004-03-08 19:56:41 UTC
Date: Mon, 8 Mar 2004 11:51:01 +0000 (GMT) 
From: Mark J Cox <mjc@redhat.com> 
To: vendor-sec@lst.de 
Subject: [vendor-sec] Some Apache issues 
 
Joe Orton committed the fixes for a couple of known Apache httpd issues 
today.  Vendors might have missed these: 
 
*** CAN-2004-0113: Apache 2/mod_ssl memory leak 
 
A memory leak in mod_ssl in Apache 2 before 2.0.49 allows a remote denial 
of service attack against an SSL-enabled server by sending plain HTTP 
requests to the SSL port. 
 
public: 20040220 
http://marc.theaimsgroup.com/?l=apache-cvs&m=107869699329638 
http://www.apacheweek.com/features/security-20 
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=27106 
 
*** CAN-2003-0993: Allow/Deny parsing on big-endian 64-bit platforms 
 
A bug in the parsing of Allow/Deny rules using IP addresses without a 
netmask on big-endian 64-bit platforms in Apache 1.3 before 1.3.30 causes 
the rules to fail to match. 
 
public: 20031015 
http://marc.theaimsgroup.com/?l=apache-cvs&m=107869603013722 
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=23850 
http://www.apacheweek.com/features/security-13 
 
Thanks, Mark 
-- 
Mark J Cox / Red Hat Security Response Team 
 
Comment 3 Peter Poeml 2004-03-10 20:51:14 UTC
I'm adding 
http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/ssl/ssl_engine_io.c?r1=1.100.2.11&r2=1.100.2.12
to the apache2 packages.

Andreas, I want to take the opportunity and make another fix available
together with the security update. Apache2 on 9.0 had an internal
default character set of UTF-9, which was the result of a
misunderstanding, see Bug 37427. Can I add it? There is no risk
associated with this change. I'm assigning to you for decision. Please
assign back to me.
Comment 4 Andreas Jaeger 2004-03-10 23:35:28 UTC
go ahead
Comment 5 Peter Poeml 2004-03-11 00:29:34 UTC
I have submitted fixed apache2 packages meanwhile.

Sec-Team:
How do we go about the apache1 problem that affects only big-endian 64
bit platforms? Only s390x should be affected, because our PPC products
are sporting 32 bit userland (with few exceptions, but apache is not
among them).

Should we fix it in the general sles7 and sles8 codebase, but ship
updates only to s390x? I don't know if this implies more overhead -- or
less.

s390x has packages here:

sles7-s390x     /work/SRC/old-versions/7.2/arch/sles-s390x/        apache 1.3.19
sles8-s390x     /work/SRC/old-versions/8.1/UL/all/                 apache 1.3.26

And, should we wait for an upcoming fix for mod_digest? (I don't think
so.)

Comment 6 Peter Poeml 2004-03-11 00:52:47 UTC
Also, if we want to be super-careful about not breaking something in
sles8 later, we could apply the patch only on s390x. What do you think?
Comment 7 Thomas Biege 2004-03-11 17:58:42 UTC
Applying it to s390x only seems more cleaner. 
I think it is no problem even if it shares the same code base as other SLES8 
products. The patch can be made arch-dependent and only s390x can be mentioned 
in the patchinfo... that is the way I would go. :) 
 
I'll attach the patchinfo files ASAP and send around the Laufzettel.... 
Comment 8 Thomas Biege 2004-03-11 18:10:09 UTC
Hm, what's about AMD64? 
Comment 9 Peter Poeml 2004-03-11 18:33:15 UTC
It's little endian ;)
Comment 10 Thomas Biege 2004-03-11 18:37:14 UTC
Created attachment 16519 [details]
patchinfo-box.apache2
Comment 11 Thomas Biege 2004-03-11 18:38:36 UTC
Created attachment 16520 [details]
patchinfo.apache1

Please verify the distribution line.
Comment 12 Peter Poeml 2004-03-17 02:35:44 UTC
I have just submitted the fixed SLES7-s390x package, which was the last
one missing.

Distribution line looks correct to me. Are you going to submit the
patchinfo files?
Comment 13 Peter Poeml 2004-03-17 03:06:17 UTC
A fixed apache package for STABLE is submitted as well now.
apache2 is at 2.0.49-rc2 in STABLE so it is fixed, too.
Comment 14 Thomas Biege 2004-03-17 17:38:21 UTC
Can you submit the patchinfos please and after that reassign this bug to me. 
Thanks! 
Comment 15 Peter Poeml 2004-03-22 16:22:28 UTC
Patchinfos submitted.
Comment 16 Thomas Biege 2004-03-22 19:10:14 UTC
Peter, 
does this fixe the following 2 vulnerabilities too? 
 
SECURITY: CAN-2004-0174 (cve.mitre.org) Fix starvation issue on listening 
sockets where a short-lived connection on a rarely-accessed listening socket 
will cause a child to hold the accept mutex and block out new connections 
until another connection arrives on that rarely-accessed listening socket. 
With Apache 2.x there is no performance concern about enabling the logic for 
platforms which don't need it, so it is enabled everywhere except for Win32. 
[Jeff Trawick] 
 
  
SECURITY: CAN-2003-0020 (cve.mitre.org) Escape arbitrary data before writing 
into the errorlog. Unescaped errorlogs are still possible using the compile 
time switch "-DAP_UNSAFE_ERROR_LOG_UNESCAPED". [Geoffrey Young, André Malo] 
Comment 17 Peter Poeml 2004-03-22 19:19:04 UTC
No, both fixes are not yet included in the above packages. 
Comment 18 Peter Poeml 2004-03-23 20:32:25 UTC
The first one of these two bugs is also tracked in Bug 51669.
Comment 19 Peter Poeml 2004-03-23 23:09:07 UTC
So to summarize it up, the fixes that are still missing in our released
apache2 packages are:

1) Bug 51669 (starvation issue)
2) the abovementioned error_log escaping
3) Bug 51668 (mod_disk_cache issue)
Comment 20 Peter Poeml 2004-03-23 23:57:58 UTC
Furthermore, version 1.3 of apache does also not escape stuff which is
written into error_log. (Just noticed the fix in httpd-1.3 cvs.)
Question to security team, do you want updates for that? I suppose no,
since it's not a vulnaribility in apache itself; I suggest we add it
together with the next security fix that pops up. We should add it to
STABLE though.
Comment 21 Peter Poeml 2004-03-24 01:43:53 UTC
Created attachment 17068 [details]
proposed patch for 2.0.48 to fix unescaped errorlog problem (backport from 2.0.49)
Comment 22 Peter Poeml 2004-03-24 21:14:29 UTC
I'm going to submit packages with fixes for 1) and 2) (refering to
comment #19)
Comment 23 Peter Poeml 2004-03-30 23:25:12 UTC
Created attachment 17486 [details]
new patchinfo file for apache2
Comment 24 Dirk Mueller 2004-03-30 23:34:17 UTC
typo in DESCRIPTION_DE: 
 
auf selten wenig Ports 
 
should read 
 
auf selten benutzte Ports 
Comment 25 Peter Poeml 2004-03-30 23:35:13 UTC
Created attachment 17488 [details]
patchinfo for apache1, typo corrected and CVE number added
Comment 26 Peter Poeml 2004-03-30 23:37:57 UTC
Both patchinfos have been submitted. Thomas, I assign to you for further
processing.
Comment 27 Peter Poeml 2004-03-30 23:39:41 UTC
To comment #24: Thanks, I have corrected it.
Comment 28 Thomas Biege 2004-04-02 17:55:56 UTC
*** Bug 51669 has been marked as a duplicate of this bug. ***
Comment 29 Dirk Mueller 2004-04-03 23:06:52 UTC
almost a month now... how long does it take to get a simple 
patch update out? 
 
 
Comment 30 Thomas Biege 2004-04-05 16:05:54 UTC
Dirk, 
how many years does people need to learn to be more gentle and to reallize 
that there are more things out there then just their own concerns. 
Comment 31 Thomas Biege 2004-04-06 00:21:38 UTC
apache2 for BOX approved 
Comment 32 Thomas Biege 2004-04-06 00:22:58 UTC
apache1 in QA-queue... 
Comment 33 Thomas Biege 2004-05-18 18:12:56 UTC

*** This bug has been marked as a duplicate of 55611 ***
Comment 34 Thomas Biege 2009-10-13 20:17:18 UTC
CVE-2004-0113: CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:N/I:N/A:P)