SecurityFocus Updates 2 Apache Vulnerabilities 15
michael path writes "SecurityFocus released two updated Apache vulnerabilities, one affecting 2.0.x (a DOS vulnerability), the other affecting both the 1.3.x and 2.0.x revisions (a buffer overflow). IBM HTTP Server is also affected by these vulnerabilities in similar version numbers."
phew (Score:5, Informative)
from my logs [Mon Apr 12 16:29:53 2004] [error] [client 64.229.154.62] request failed: URI too long
from the article [securityfocus.com]From my machine $ httpd -v
Server version: Apache/1.3.29 (Unix)
Server built: Nov 3 2003 19:54:39
That's a different bug. (Score:4, Informative)
[Sun Apr 11 00:45:43 2004] [error] [client 24.78.143.66] request failed: URI too long
You haven't identified the problem at all. I just wish there was an easy way to filter out those requests before they hit by Apache and crapfill my logs.
Re:That's a different bug. (Score:1)
I know :) - But there has been a lot of attempts at buffer exploits via the url lately... it just happened to be handy. I believe this is the webdav exploit.
I'm getting sick of seeing \xb1\x02 in my access log too - theres a thread over here [apachefreaks.com] with some ideas on how to do it - but haven't had the chance yet (exam week)
OS X (Score:5, Informative)
2.0.49 (Score:1)
Old news (Score:5, Informative)
If you want more complete information about
apache security issues, a better source is
http://www.apacheweek.com/features/security-2
and
http://www.apacheweek.com/features/securit
Some information in incorrect. (Score:3, Informative)
If you're running Slack, just download the source, run apache.SlackBuild, and upgradepkg to become non-vulnerable.
Fixed for 1.3.x a long time ago... (Score:1)
Red Hat backported the fix into their custom 1.3.27 version in this errata, released 12/18:
https://rhn.redhat.com/errata/RHSA-2003-405.html [redhat.com]
APT-GET UPDATE; APT-GET DIST-UPGRADE (Score:2)
- A Weblog from Nigeria [afriguru.com]