6213469 2001-03-12 18:46 -0800 /152 rader/ Dan Harkless <dan-bugtraq@DILVISH.SPEED.NET> Sänt av: joel@lysator.liu.se Importerad: 2001-03-14 01:57 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: dan-bugtraq@DILVISH.SPEED.NET Mottagare: Bugtraq (import) <15896> Ärende: FORW: [ANNOUNCE] Apache 1.3.19 Released ------------------------------------------------------------ From: Dan Harkless <dan-bugtraq@DILVISH.SPEED.NET> To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <200103130246.SAA26708@dilvish.speed.net> Perhaps I missed it, but I don't recall seeing this vulnerability discussed on Bugtraq. They don't make it clear which pre-1.3.19 versions of Apache are affected. I've emailed Martin Kraemer for clarification and will post here when/if he responds. ------- Forwarded Message Date: Mon, 12 Mar 2001 02:16:16 -0800 From: Martin Kraemer <martin@apache.org> To: announce@apache.org Subject: [ANNOUNCE] Apache 1.3.19 Released Message-ID: <20010312021615.A87006@daedalus.apache.org> Organization: Apache Software Foundation [Sorry for the late announcement. The package is already available since 01-Mar-2001. Martin] Apache 1.3.19 Released The Apache Software Foundation and The Apache Server Project are pleased to announce the release of version 1.3.19 of the Apache HTTP server. (Version 1.3.18 was not released due to an incorrect fix addressing hostnames with url-escaped characters. A corrected fix will be included in the next release) This version of Apache is primarily a security fix release addressing a problem which could lead to a directory listing being displayed in place of an error message. Also, it fixes some broken functionality present in the 1.3.17 release and various Win32 issues. A summary of the new features is given at the end of this document. We consider Apache 1.3.19 to be the best version of Apache available and we strongly recommend that users of older versions, especially of the 1.1.x and 1.2.x family, upgrade as soon as possible. No further releases will be made in the 1.2.x family. Apache 1.3.19 is available for download from http://httpd.apache.org/dist/ Please see the CHANGES_1.3 file in the same directory for a full list of changes. Binary distributions are available from http://httpd.apache.org/dist/binaries/ The source and binary distributions are also available via any of the mirrors listed at http://www.apache.org/mirrors/ As of Apache 1.3.12 binary distributions contain all standard Apache modules as shared objects (if supported by the platform) and include full source code. Installation is easily done by executing the included install script. See the README.bindist and INSTALL.bindist files for a complete explanation. Please note that the binary distributions are only provided for your convenience and current distributions for specific platforms are not always available. As of Apache 1.3.17 the Win32 binary distribution is now based on the Microsoft Installer (.MSI) technology. This change occured in order to resolve the many problems WinME and Win2K users experienced with the older InstallShield-based installer .exe file. Development continues to make this new installation method more robust, questions should be directed at the news:comp.infosystems.www.servers.ms-windows news group. Apache 1.3.17 for Win32 also marked the first 'initial release quality' version available for Win32, and users are strongly discouraged from using the older 'beta quality releases'. For an overview of new features introduced after 1.2 please see http://httpd.apache.org/docs/new_features_1_3.html In general, Apache 1.3 offers several substantial improvements over version 1.2, including better performance, reliability and a wider range of supported platforms, including Windows 95/98 and NT (which fall under the "Win32" label). Apache is the most popular web server in the known universe; over half of the servers on the Internet are running Apache or one of its variants. IMPORTANT NOTE FOR WIN32 USERS: Over the years, many users have come to trust Apache as a secure and stable server. It must be realized that the current Win32 code has not yet reached the levels of the Unix version, but is of acceptable quality. Any Win32 stability or security problems do not impact, in any way, Apache on other platforms. Apache 1.3.19 Major changes The primary security fix is: * The default installation could lead mod_negotiation and mod_dir or mod_autoindex to display a directory listing instead of the multiview'ed index.html.* files, if a very long path was created artificially by using many slashes. Now 403 FORBIDDEN is returned. The bug fixes are: * The ServerRoot directive now removes trailing slashes. * Restore functionality broken by the mod_rewrite security fix: The mod_rewrite string arithmetic is corrected for rewrite map. * Some possible segfault conditions have been fixed. * Under certain circumstances, Apache did not supply the right response headers when requiring authentication. The main new features include: * New configuration error reporting if the UserDir argument is set to a relative path on Win32 or Netware [which do not support home directories], or a relative path on any platform if that path includes the '*' username substitution. Selected new features that relate to Windows platforms: * Apache on Win9x now ensures the service is stopped before removal. * Test httpd.conf (-t) now holds the console open on "SYNTAX OK". * Apache/Win32 no longer holds open the console on error unless it was invoked from a shortcut with the -w option. * mod_user was significantly refactored to assure that the UserDir directive is parsed effectively the same across platforms, fixing a UserDir bug introduced in 1.3.17 on the Win32 platform. Selected new features relating to other platforms: * Netware problems with file extension truncatation are resolved. * Netware recognizes the SERVER/VOLUME:/PATH/FILE filename pattern. * Netware mod_tls properly disables nagle for SSL connections, and properly negotiates SSL based on the port. * Startup and Shutdown issues were addressed on TPF. - -- <Martin.Kraemer@Fujitsu-Siemens.com> | Fujitsu Siemens <martin@apache.org> | 81730 Munich, Germany - --------------------------------------------------------------------- You have received this mail because you are subscribed to the announce@apache.org mailing list. To unsubscribe, e-mail: announce-unsubscribe@apache.org For additional commands, e-mail: announce-help@apache.org ------- End of Forwarded Message ---------------------------------------------------------------------- Dan Harkless | To prevent SPAM contamination, please dan-bugtraq@dilvish.speed.net | do not mention this private email SpeedGate Communications, Inc. | address in Usenet posts. Thank you. (6213469) --------------------------------(Ombruten) 6213650 2001-03-13 00:58 -0800 /35 rader/ Dan Harkless <dan-bugtraq@DILVISH.SPEED.NET> Sänt av: joel@lysator.liu.se Importerad: 2001-03-14 05:35 av Brevbäraren (som är implementerad i) Python Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM Externa svar till: dan-bugtraq@DILVISH.SPEED.NET Mottagare: Bugtraq (import) <15902> Ärende: FORW: Re: [ANNOUNCE] Apache 1.3.19 Released ------------------------------------------------------------ From: Dan Harkless <dan-bugtraq@DILVISH.SPEED.NET> To: BUGTRAQ@SECURITYFOCUS.COM Message-ID: <200103130858.AAA11506@dilvish.speed.net> Here's Martin's response to my question about what Apache versions have that hole: ------- Forwarded Message Date: Tue, 13 Mar 2001 09:51:52 +0100 From: Martin Kraemer <Martin.Kraemer@Fujitsu-Siemens.com> Subject: Re: [ANNOUNCE] Apache 1.3.19 Released Message-ID: <20010313095152.B81887@deejai2.mch.fsc.net> On Mon, Mar 12, 2001 at 06:40:04PM -0800, Dan Harkless wrote: > What versions of Apache are susceptible to that "very long path" directory > listing disclosure bug? All previous versions, or...? Yes, unfortunately. This bug probably was already in 1.2.x. Martin - -- <Martin.Kraemer@Fujitsu-Siemens.com> | Fujitsu Siemens Fon: +49-89-636-46021, FAX: +49-89-636-41143 | 81730 Munich, Germany ------- End of Forwarded Message ---------------------------------------------------------------------- Dan Harkless | To prevent SPAM contamination, please dan-bugtraq@dilvish.speed.net | do not mention this private email SpeedGate Communications, Inc. | address in Usenet posts. Thank you. (6213650) --------------------------------(Ombruten)