86244 2002-12-06  15:52  /196 rader/  <security@caldera.com>
Importerad: 2002-12-06  15:52  av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Extern mottagare: announce@lists.caldera.com
Extern mottagare: security-alerts@linuxsecurity.com
Extern mottagare: full-disclosure@lists.netsys.com
Externa svar till: please_reply_to_security@caldera.com
Mottagare: Bugtraq (import) <2676>
Ärende: Security Update: [CSSA-2002-056.0] Linux: apache vulnerabilities in shared memory, DNS, and ApacheBench
------------------------------------------------------------
To: bugtraq@securityfocus.com announce@lists.caldera.com security-alerts@linuxsecurity.com full-disclosure@lists.netsys.com

______________________________________________________________________________

			SCO Security Advisory

Subject:		Linux: apache vulnerabilities in shared memory, DNS, and ApacheBench
Advisory number: 	CSSA-2002-056.0
Issue date: 		2002 December 05
Cross reference:
______________________________________________________________________________


1. Problem Description

	The shared memory scoreboard in the HTTP daemon for Apache
	allows any user running as the Apache UID to send a SIGUSR1
	signal to any process as root, resulting in a denial of
	service (process kill) or possibly other behaviors that would
	not normally be allowed, by modifying the parent[].pid and
	parent[].last_rtime segments in the scoreboard.

	Cross-site scripting (XSS) vulnerability in the default error
	page of Apache when UseCanonicalName is "Off" and support for
	wildcard DNS is present, allows remote attackers to execute
	script as other web page visitors via the Host: header.

	Buffer overflows in the ApacheBench support program (ab.c) in
	Apache allow a malicious web server to cause a denial of
	service and possibly execute arbitrary code via a long
	response.


2. Vulnerable Supported Versions

	System				Package
	----------------------------------------------------------------------

	OpenLinux 3.1.1 Server		prior to apache-1.3.27-1.0.i386.rpm
					prior to apache-devel-1.3.27-1.0.i386.rpm
					prior to apache-doc-1.3.27-1.0.i386.rpm

	OpenLinux 3.1.1 Workstation	prior to apache-1.3.27-1.0.i386.rpm
					prior to apache-devel-1.3.27-1.0.i386.rpm
					prior to apache-doc-1.3.27-1.0.i386.rpm

	OpenLinux 3.1 Server		prior to apache-1.3.27-1.0.i386.rpm
					prior to apache-devel-1.3.27-1.0.i386.rpm
					prior to apache-doc-1.3.27-1.0.i386.rpm

	OpenLinux 3.1 Workstation	prior to apache-1.3.27-1.0.i386.rpm
					prior to apache-devel-1.3.27-1.0.i386.rpm
					prior to apache-doc-1.3.27-1.0.i386.rpm


3. Solution

	The proper solution is to install the latest packages. Many
	customers find it easier to use the Caldera System Updater,
	called cupdate (or kcupdate under the KDE environment), to
	update these packages rather than downloading and installing
	them by hand.


4. OpenLinux 3.1.1 Server

	4.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2002-056.0/RPMS

	4.2 Packages

	c7b17000acd9101eee8c37d3b4601ec8
	apache-1.3.27-1.0.i386.rpm
	d857c04c257932ae2a4eaeb1aed19e8c
	apache-devel-1.3.27-1.0.i386.rpm
	68c4e2eb95a1ca1493f4eb0c8b54fff2
	apache-doc-1.3.27-1.0.i386.rpm

	4.3 Installation

	rpm -Fvh apache-1.3.27-1.0.i386.rpm
	rpm -Fvh apache-devel-1.3.27-1.0.i386.rpm
	rpm -Fvh apache-doc-1.3.27-1.0.i386.rpm

	4.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Server/CSSA-2002-056.0/SRPMS

	4.5 Source Packages

	593f46d5622a2191ee9affda05b96b7c
apache-1.3.27-1.0.src.rpm


5. OpenLinux 3.1.1 Workstation

	5.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2002-056.0/RPMS

	5.2 Packages

	afe15920bac4b43bda8c9c3e78d30067
	apache-1.3.27-1.0.i386.rpm
	962f0f2c795b1012fe1c3d36981a732d
	apache-devel-1.3.27-1.0.i386.rpm
	2f7bd182f5e458a228edd03b487466d0
	apache-doc-1.3.27-1.0.i386.rpm

	5.3 Installation

	rpm -Fvh apache-1.3.27-1.0.i386.rpm
	rpm -Fvh apache-devel-1.3.27-1.0.i386.rpm
	rpm -Fvh apache-doc-1.3.27-1.0.i386.rpm

	5.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1.1/Workstation/CSSA-2002-056.0/SRPMS

	5.5 Source Packages

	89d64819da7385209cca310c4ce097a1
apache-1.3.27-1.0.src.rpm


6. OpenLinux 3.1 Server

	6.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2002-056.0/RPMS

	6.2 Packages

	5bb492139575fb1908c29777242c89db
	apache-1.3.27-1.0.i386.rpm
	1a28bc1f4d8e27761da8623385cfd430
	apache-devel-1.3.27-1.0.i386.rpm
	18774c4e1c471d3c0532203e3053035a
	apache-doc-1.3.27-1.0.i386.rpm

	6.3 Installation

	rpm -Fvh apache-1.3.27-1.0.i386.rpm
	rpm -Fvh apache-devel-1.3.27-1.0.i386.rpm
	rpm -Fvh apache-doc-1.3.27-1.0.i386.rpm

	6.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Server/CSSA-2002-056.0/SRPMS

	6.5 Source Packages

	6a329cad378b982f7864722cd8bc7b71
apache-1.3.27-1.0.src.rpm


7. OpenLinux 3.1 Workstation

	7.1 Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Workstation/CSSA-2002-056.0/RPMS

	7.2 Packages

	96b47bab30d5a625917fa37536904765
	apache-1.3.27-1.0.i386.rpm
	0b6e58d39dfbc52daf6662b51116e3db
	apache-devel-1.3.27-1.0.i386.rpm
	d29dabf7e838b143006c32122547f7dc
	apache-doc-1.3.27-1.0.i386.rpm

	7.3 Installation

	rpm -Fvh apache-1.3.27-1.0.i386.rpm
	rpm -Fvh apache-devel-1.3.27-1.0.i386.rpm
	rpm -Fvh apache-doc-1.3.27-1.0.i386.rpm

	7.4 Source Package Location

	ftp://ftp.sco.com/pub/updates/OpenLinux/3.1/Workstation/CSSA-2002-056.0/SRPMS

	7.5 Source Packages

	146818586bde204a4d0eaf44e32d23e3
apache-1.3.27-1.0.src.rpm


8. References

	Specific references for this advisory:

		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0839
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0843

	SCO security resources:

		http://www.sco.com/support/security/index.html

	This security fix closes SCO incidents sr870244, fz526296,
	erg712139.


9. Disclaimer

	SCO is not responsible for the misuse of any of the
	information we provide on this website and/or through our
	security advisories. Our advisories are a service to our
	customers intended to promote secure installation and use of
	SCO products.

______________________________________________________________________________
(86244) / <security@caldera.com>/---------(Ombruten)
Bilaga (application/pgp-signature) i text 86245
86245 2002-12-06  15:52  /9 rader/  <security@caldera.com>
Importerad: 2002-12-06  15:52  av Brevbäraren
Extern mottagare: bugtraq@securityfocus.com
Extern mottagare: announce@lists.caldera.com
Extern mottagare: security-alerts@linuxsecurity.com
Extern mottagare: full-disclosure@lists.netsys.com
Externa svar till: please_reply_to_security@caldera.com
Mottagare: Bugtraq (import) <2677>
Bilaga (text/plain) till text 86244
Ärende: Bilaga till: Security Update: [CSSA-2002-056.0] Linux: apache vulnerabilities in shared memory, DNS, and ApacheBench
------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (SCO_SV)
Comment: For info see http://www.gnupg.org

iEYEARECAAYFAj3v7sUACgkQbluZssSXDTHCHgCgmlx1yb/OESslQy/+VX++oHPw
5KMAnidkofjD5ao29dohhgbfH5EMPhoo
=OCH7
-----END PGP SIGNATURE-----
(86245) / <security@caldera.com>/-------------------