Ravens PHP Scripts

Apache mod_rewrite Off-By-One Buffer Overflow Vulnerability
Date: Friday, July 28, 2006 @ 07:14:21 CDT
Topic: Security


TITLE: Apache mod_rewrite Off-By-One Buffer Overflow Vulnerability

SECUNIA ADVISORY ID: SA21197

VERIFY ADVISORY: http://secunia.com/advisories/21197/

CRITICAL: Moderately critical

IMPACT: DoS, System access

WHERE: >From remote

SOFTWARE: Apache 1.3.x -- http://secunia.com/product/72/
Apache 2.0.x -- http://secunia.com/product/73/
Apache 2.2.x -- http://secunia.com/product/9633/

DESCRIPTION: A vulnerability has been reported in Apache HTTP Server, which potentially can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused by a off-by-one error in mod_rewrite and can be exploited to cause a one-byte buffer overflow.

Successful exploitation may crash the web server process or allow execution of arbitrary code. However, this depends on the manner which Apache HTTP Server was compiled and also requires the following:
* Certain types of Rewrite rules are used where the beginning of the rewritten URL is controlled.
* The RewriteRule flags do not include the Forbidden (F), Gone (G), or NoEscape (NE) flag.

The vulnerability affects Apache 1.3 since 1.3.28, 2.0 since 2.0.46, and 2.2 since 2.2.0.

SOLUTION: Update to version 1.3.37, 2.0.59, or 2.2.3.

PROVIDED AND/OR DISCOVERED BY: The vendor credits Mark Dowd, McAfee Avert Labs.

ORIGINAL ADVISORY:
http://www.apache.org/dist/httpd/Announcement1.3.html
http://www.apache.org/dist/httpd/Announcement2.0.html
http://www.apache.org/dist/httpd/Announcement2.2.html








This article comes from Ravens PHP Scripts
https://www.ravenphpscripts.com

The URL for this story is:
https://www.ravenphpscripts.com/modules.php?name=News&file=article&sid=2274