Bug#136801: Apache-SSL buffer overflow (fix available)
Package: apache-ssl
Severity: critical
----- Forwarded message from Ben Laurie <ben@algroup.co.uk> -----
Date: Fri, 01 Mar 2002 11:47:36 +0000
From: Ben Laurie <ben@algroup.co.uk>
To: Apache SSL Announce <apache-sslannounce@lists.aldigital.co.uk>,
Bugtraq <BUGTRAQ@SECURITYFOCUS.COM>,
CERT Coordination Center <cert@cert.org>,
Apache List <new-httpd@apache.org>
Subject: Apache-SSL buffer overflow (fix available)
Apache-SSL buffer overflow condition (all versions prior to 1.3.22+1.46)
------------------------------------------------------------------------
Synopsis
--------
A buffer overflow was recently found in mod_ssl, see:
http://archives.neohapsis.com/archives/bugtraq/2002-02/0313.html
for details. The offending code in mod_ssl was, in fact, derived from
Apache-SSL, and Apache-SSL is also vulnerable.
As in mod_ssl, this flaw can only be exploited if client certificates
are being used, and the certificate in question must be issued by a
trusted CA.
Fix
---
Download Apache-SSL 1.3.22+1.46 from the usual places (see
http://www.apache-ssl.org/).
Acknowledgements
----------------
Thanks to Ed Moyle for finding the flaw.
Rant
----
No thanks to anyone at all for alerting me before going
public. Cheers, guys.
Links
-----
This advisory can be found at:
http://www.apache-ssl.org/advisory-20020301.txt
A mirror which definitely has the new version:
ftp://opensores.thebunker.net/pub/mirrors/apache-ssl/apache_1.3.22+ssl_1.46.tar.gz
Ben Laurie, March 1, 2002.
--
http://www.apache-ssl.org/ben.html http://www.thebunker.net/
"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff
----- End forwarded message -----
--
- mdz
Reply to: