CVE-2004-0113
CVSS5.0
发布时间 :2004-03-29 00:00:00
修订时间 :2016-10-17 22:41:00
NMCOPS    

[原文]Memory leak in ssl_engine_io.c for mod_ssl in Apache 2 before 2.0.49 allows remote attackers to cause a denial of service (memory consumption) via plain HTTP requests to the SSL port of an SSL-enabled server.


[CNNVD]Apache Mod_SSL HTTP请求远程拒绝服务攻击漏洞(CNNVD-200403-137)

        
        Mod_SSL是Apache服务器上的SSL实现,用来为Apache Web服务器提供加密支持。
        mod_ssl存在一个内存泄露问题,远程攻击者可以利用这个漏洞发送标准HTTP请求给SSL端口,可导致远程拒绝服务攻击。
        详细漏洞细节目前没有提供。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:apache:http_server:2.0.40Apache Software Foundation Apache HTTP Server 2.0.40
cpe:/a:apache:http_server:2.0.41Apache Software Foundation Apache HTTP Server 2.0.41
cpe:/a:apache:http_server:2.0.42Apache Software Foundation Apache HTTP Server 2.0.42
cpe:/a:apache:http_server:2.0.43Apache Software Foundation Apache HTTP Server 2.0.43
cpe:/a:apache:http_server:2.0.44Apache Software Foundation Apache HTTP Server 2.0.44
cpe:/a:apache:http_server:2.0.45Apache Software Foundation Apache HTTP Server 2.0.45
cpe:/a:apache:http_server:2.0.35Apache Software Foundation Apache HTTP Server 2.0.35
cpe:/a:apache:http_server:2.0.46Apache Software Foundation Apache HTTP Server 2.0.46
cpe:/a:apache:http_server:2.0.36Apache Software Foundation Apache HTTP Server 2.0.36
cpe:/a:apache:http_server:2.0.47Apache Software Foundation Apache HTTP Server 2.0.47
cpe:/a:apache:http_server:2.0.37Apache Software Foundation Apache HTTP Server 2.0.37
cpe:/a:apache:http_server:2.0.48Apache Software Foundation Apache HTTP Server 2.0.48
cpe:/a:apache:http_server:2.0.38Apache Software Foundation Apache HTTP Server 2.0.38
cpe:/a:apache:http_server:2.0.39Apache Software Foundation Apache HTTP Server 2.0.39

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:9676Memory leak in ssl_engine_io.c for mod_ssl in Apache 2 before 2.0.49 allows remote attackers to cause a denial of service (memory consumptio...
oval:org.mitre.oval:def:876Apache 2 Denial of Service due to Memory Leak in mod_ssl
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0113
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0113
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200403-137
(官方数据源) CNNVD

- 其它链接及资源

http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000839
(UNKNOWN)  CONECTIVA  CLSA-2004:839
http://issues.apache.org/bugzilla/show_bug.cgi?id=27106
(UNKNOWN)  MISC  http://issues.apache.org/bugzilla/show_bug.cgi?id=27106
http://marc.info/?l=apache-cvs&m=107869699329638
(UNKNOWN)  MLIST  [apache-cvs] 20040307 cvs commit: httpd-2.0/modules/ssl ssl_engine_io.c
http://marc.info/?l=bugtraq&m=108034113406858&w=2
(UNKNOWN)  BUGTRAQ  20040325 LNSA-#2004-0006: bug workaround for Apache 2.0.48
http://marc.info/?l=bugtraq&m=108369640424244&w=2
(UNKNOWN)  APPLE  APPLE-SA-2004-05-03
http://marc.info/?l=bugtraq&m=108731648532365&w=2
(UNKNOWN)  HP  SSRT4717
http://security.gentoo.org/glsa/glsa-200403-04.xml
(UNKNOWN)  GENTOO  GLSA-200403-04
http://www.apacheweek.com/features/security-20
(VENDOR_ADVISORY)  CONFIRM  http://www.apacheweek.com/features/security-20
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:043
(UNKNOWN)  MANDRAKE  MDKSA-2004:043
http://www.redhat.com/support/errata/RHSA-2004-084.html
(UNKNOWN)  REDHAT  RHSA-2004:084
http://www.redhat.com/support/errata/RHSA-2004-182.html
(UNKNOWN)  REDHAT  RHSA-2004:182
http://www.securityfocus.com/bid/9826
(VENDOR_ADVISORY)  BID  9826
http://www.trustix.org/errata/2004/0017
(UNKNOWN)  TRUSTIX  2004-0017
http://xforce.iss.net/xforce/xfdb/15419
(VENDOR_ADVISORY)  XF  apache-modssl-plain-dos(15419)

- 漏洞信息

Apache Mod_SSL HTTP请求远程拒绝服务攻击漏洞
中危 设计错误
2004-03-29 00:00:00 2005-05-13 00:00:00
远程  
        
        Mod_SSL是Apache服务器上的SSL实现,用来为Apache Web服务器提供加密支持。
        mod_ssl存在一个内存泄露问题,远程攻击者可以利用这个漏洞发送标准HTTP请求给SSL端口,可导致远程拒绝服务攻击。
        详细漏洞细节目前没有提供。
        

- 公告与补丁

        厂商补丁:
        Apache Software Foundation
        --------------------------
        Apache CVS版本已经修正此漏洞:
        
        http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/ssl/ssl_engine_io.c?r1=1.117&r2=1.118

- 漏洞信息 (F32909)

apache2049.txt (PacketStormID:F32909)
2004-03-19 00:00:00
 
advisory,denial of service,arbitrary,vulnerability,memory leak
CVE-2004-0174,CVE-2003-0020,CVE-2004-0113
[点击下载]

Apache 2.0.49 has been released to address three security vulnerabilities. A race condition that allows for a denial of service attack, a condition that allow arbitrary strings to get written to the error log, and a memory leak in mod_ssl have all been addressed.

---------- Forwarded message ----------
Date: Fri, 19 Mar 2004 22:55:38 +0100
From: Sander Striker <striker@apache.org>
To: announce@httpd.apache.org
Subject: [ANNOUNCE] Apache HTTP Server 2.0.49 Released

                   Apache HTTP Server 2.0.49 Released

   The Apache Software Foundation and the  The Apache HTTP Server Project are
   pleased to announce the release of version 2.0.49 of the Apache HTTP
   Server ("Apache").  This Announcement notes the significant changes
   in 2.0.49 as compared to 2.0.48.

   This version of Apache is principally a bug fix release.  A summary of
   the bug fixes is given at the end of this document.  Of particular
   note is that 2.0.49 addresses three security vulnerabilities:

   When using multiple listening sockets, a denial of service attack
   is possible on some platforms due to a race condition in the
   handling of short-lived connections.  This issue is known to affect
   some versions of AIX, Solaris, and Tru64; it is known to not affect
   FreeBSD or Linux.
   [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174]

   Arbitrary client-supplied strings can be written to the error log
   which can allow exploits of certain terminal emulators.
   [http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020]

   A remotely triggered memory leak in mod_ssl can allow a denial
   of service attack due to excessive memory consumption.
   [http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113]

   This release is compatible with modules compiled for 2.0.42 and later
   versions.  We consider this release to be the best version of Apache
   available and encourage users of all prior versions to upgrade.

   Apache HTTP Server 2.0.49 is available for download from

     http://httpd.apache.org/download.cgi

   Please see the CHANGES_2.0 file, linked from the above page, for
   a full list of changes.

   Apache 2.0 offers numerous enhancements, improvements, and performance
   boosts over the 1.3 codebase.  For an overview of new features introduced
   after 1.3 please see

     http://httpd.apache.org/docs-2.0/new_features_2_0.html

   When upgrading or installing this version of Apache, please keep
   in mind the following:
   If you intend to use Apache with one of the threaded MPMs, you must
   ensure that the modules (and the libraries they depend on) that you
   will be using are thread-safe.  Please contact the vendors of these
   modules to obtain this information.

                       Apache 2.0.49 Major changes

   Security vulnerabilities closed since Apache 2.0.48

    *) SECURITY: CAN-2004-0174 (cve.mitre.org)
       Fix starvation issue on listening sockets where a short-lived
       connection on a rarely-accessed listening socket will cause a
       child to hold the accept mutex and block out new connections until
       another connection arrives on that rarely-accessed listening socket.
       With Apache 2.x there is no performance concern about enabling the
       logic for platforms which don't need it, so it is enabled everywhere
       except for Win32.  [Jeff Trawick]

    *) SECURITY: CAN-2004-0113 (cve.mitre.org)
       mod_ssl: Fix a memory leak in plain-HTTP-on-SSL-port handling.
       PR 27106.  [Joe Orton]

    *) SECURITY: CAN-2003-0020 (cve.mitre.org)
       Escape arbitrary data before writing into the errorlog. Unescaped
       errorlogs are still possible using the compile time switch
       "-DAP_UNSAFE_ERROR_LOG_UNESCAPED".  [Geoffrey Young, André Malo]

   Bugs fixed and features added since Apache 2.0.47

    *) mod_cgid: Fix storage corruption caused by use of incorrect pool.
       [Jeff Trawick]

    *) Win32: find_read_listeners was not correctly handling multiple
       listeners on the Win32DisableAcceptEx path.  [Bill Stoddard]

    *) Fix bug in mod_usertrack when no CookieName is set.  PR 24483.
       [Manni Wood <manniwood planet-save.com>]

    *) Fix some piped log problems: bogus "piped log program '(null)'
       failed" messages during restart and problem with the logger
       respawning again after Apache is stopped.  PR 21648, PR 24805.
       [Jeff Trawick]

    *) Fixed file extensions for real media files and removed rpm extension
       from mime.types. PR 26079.  [Allan Sandfeld <kde carewolf.com>]

    *) Remove compile-time length limit on request strings. Length is
       now enforced solely with the LimitRequestLine config directive.
       [Paul J. Reder]

    *) mod_ssl: Send the Close Alert message to the peer before closing
       the SSL session.  PR 27428.  [Madhusudan Mathihalli, Joe Orton]

    *) mod_ssl: Fix bug in passphrase handling which could cause spurious
       failures in SSL functions later.  PR 21160.  [Joe Orton]

    *) mod_log_config: Fix corruption of buffered logs with threaded
       MPMs.  PR 25520.  [Jeff Trawick]

    *) Fix mod_include's expression parser to recognize strings correctly
       even if they start with an escaped token.  [André Malo]

    *) Add fatal exception hook for use by diagnostic modules.  The hook
       is only available if the --enable-exception-hook configure parm
       is used and the EnableExceptionHook directive has been set to
       "on".  [Jeff Trawick]

    *) Allow mod_auth_digest to work with sub-requests with different
       methods than the original request.  PR 25040.
       [Josh Dady <jpd indecisive.com>]

    *) fix "Expected </Foo>> but saw </Foo>" errors in nested,
       argumentless containers.
       ["Philippe M. Chiasson" <gozer cpan.org>]

    *) mod_auth_ldap: Fix some segfaults in the cache logic.  PR 18756.
       [Matthieu Estrade <apache moresecurity.org>, Brad Nicholes]

    *) mod_cgid: Restart the cgid daemon if it crashes.  PR 19849
       [Glenn Nielsen <glenn apache.org>]

    *) The whole codebase was relicensed and is now available under
       the Apache License, Version 2.0 (http://www.apache.org/licenses).
       [Apache Software Foundation]

    *) Fixed cache-removal order in mod_mem_cache.
       [Jean-Jacques Clar, Cliff Woolley]

    *) mod_setenvif: Fix the regex optimizer, which under circumstances
       treated the supplied regex as literal string. PR 24219.
       [André Malo]

    *) ap_mpm.h: Fix include guard of ap_mpm.h to reference mpm
       instead of mmn. [André Malo]

    *) mod_rewrite: Catch an edge case, where strange subsequent RewriteRules
       could lead to a 400 (Bad Request) response.  [André Malo]

    *) Keep focus of ITERATE and ITERATE2 on the current module when
       the module chooses to return DECLINE_CMD for the directive.
       PR 22299.  [Geoffrey Young <geoff apache.org>]

    *) Add support for IMT minor-type wildcards (e.g., text/*) to
       ExpiresByType.  PR#7991  [Ken Coar]

    *) Fix segfault in mod_mem_cache cache_insert() due to cache size
       becoming negative.  PR: 21285, 21287
       [Bill Stoddard, Massimo Torquati, Jean-Jacques Clar]

    *) core.c: If large file support is enabled, allow any file that is
       greater than AP_MAX_SENDFILE to be split into multiple buckets.
       This allows Apache to send files that are greater than 2gig.
       Otherwise we run into 32/64 bit type mismatches in the file size.
       [Brad Nicholes]

    *) proxy_http fix: mod_proxy hangs when both KeepAlive and
       ProxyErrorOverride are enabled, and a non-200 response without a
       body is generated by the backend server. (e.g.: a client makes a
       request containing the "If-Modified-Since" and "If-None-Match"
       headers, to which the backend server respond with status 304.)
       [Graham Wiseman <gwiseman fscinternet.com>, Richard Reiner]

    *) mod_dav: Reject requests which include an unescaped fragment in the
       Request-URI.  PR 21779.  [Amit Athavale <amit_athavale lycos.com>]

    *) Build array of allowed methods with proper dimensions, fixing
       possible memory corruption.  [Jeff Trawick]

    *) mod_ssl: Fix potential segfault on lookup of SSL_SESSION_ID.
       PR 15057.  [Otmar Lendl <lendl nic.at>]

    *) mod_ssl: Fix streaming output from an nph- CGI script. PR 21944
       [Joe Orton]

    *) mod_usertrack no longer inspects the Cookie2 header for
       the cookie name. PR 11475.  [Chris Darrochi <chrisd pearsoncmg.com>]

    *) mod_usertrack no longer overwrites other cookies.
       PR 26002.  [Scott Moore <apache nopdesign.com>]

    *) worker MPM: fix stack overlay bug that could cause the parent
       process to crash.  [Jeff Trawick]

    *) Win32: Add Win32DisableAcceptEx directive. This Windows
       NT/2000/XP directive is useful to work around bugs in some
       third party layered service providers like virus scanners,
       VPN and firewall products, that do not properly handle
       WinSock 2 APIs.  Use this directive if your server is issuing
       AcceptEx failed messages.
       [Allan Edwards, Bill Rowe, Bill Stoddard, Jeff Trawick]

    *) Make REMOTE_PORT variable available in mod_rewrite.
       PR 25772.  [André Malo]

    *) Fix a long delay with CGI requests and keepalive connections on
       AIX.  [Jeff Trawick]

    *) mod_autoindex: Add 'XHTML' option in order to allow switching between
       HTML 3.2 and XHTML 1.0 output. PR 23747.  [André Malo]

    *) Add XHTML Document Type Definitions to httpd.h (minor MMN bump).
       [André Malo]

    *) mod_ssl: Advertise SSL library version as determined at run-time rather
       than at compile-time.  PR 23956.  [Eric Seidel <seidel apple.com>]

    *) mod_ssl: Fix segfault on a non-SSL request if the 'c' log
       format code is used.  PR 22741.  [Gary E. Miller <gem rellim.com>]

    *) Fix build with parallel make.  PR 24643.  [Joe Orton]

    *) mod_rewrite: In external rewrite maps lookup keys containing
       a newline now cause a lookup failure. PR 14453.
       [Cedric Gavage <cedric.gavage unixtech.be>, André Malo]

    *) Backport major overhaul of mod_include's filter parser from 2.1.
       The new parser code is expected to be more robust and should
       catch all of the edge cases that were not handled by the previous one.
       The 2.1 external API changes were hidden by a wrapper which is
       expected to keep the API backwards compatible.  [André Malo]

    *) Add a hook (insert_error_filter) to allow filters to re-insert
       themselves during processing of error responses. Enable mod_expires
       to use the new hook to include Expires headers in valid error
       responses. This addresses an RFC violation. It fixes PRs 19794,
       24884, and 25123. [Paul J. Reder]

    *) Add Polish translation of error messages.  PR 25101.
       [Tomasz Kepczynski <tomek jot23.org>]

    *) Add AP_MPMQ_MPM_STATE function code for ap_mpm_query. (Not yet
       supported for BeOS or OS/2 MPMs.)  [Jeff Trawick, Brad Nicholes,
       Bill Stoddard]

    *) Add mod_status hook to allow modules to add to the mod_status
       report.  [Joe Orton]

    *) Fix htdbm to generate comment fields in DBM files correctly.
       [Justin Erenkrantz]

    *) mod_dav: Use bucket brigades when reading PUT data. This avoids
       problems if the data stream is modified by an input filter. PR 22104.
       [Tim Robbins <tim robbins.dropbear.id.au>, André Malo]

    *) Fix RewriteBase directive to not add double slashes.  [André Malo]

    *) Improve 'configure --help' output for some modules.  [Astrid Keßler]

    *) Correct UseCanonicalName Off to properly check incoming port number.
       [Jim Jagielski]

    *) Fix slow graceful restarts with prefork MPM.  [Joe Orton]

    *) Fix a problem with namespace mappings being dropped in mod_dav_fs;
       if any property values were set which defined namespaces these
       came out mangled in the PROPFIND response.  PR 11637.
       [Amit Athavale <amit_athavale persistent.co.in>]

    *) mod_dav: Return a WWW-auth header for MOVE/COPY requests where
       the destination resource gives a 401.  PR 15571.  [Joe Orton]

    *) mod_autoindex / core: Don't fail to show filenames containing
       special characters like '%'. PR 13598.  [André Malo]

    *) mod_status: Report total CPU time accurately when using a threaded
       MPM.  PR 23795.  [Jeff Trawick]

    *) Fix memory leak in handling of request bodies during reverse
       proxy operations.  PR 24991. [Larry Toppi <larry.toppi citrix.com>]

    *) Win32 MPM: Implement MaxMemFree to enable setting an upper
       limit on the amount of storage used by the bucket brigades
       in each server thread. [Bill Stoddard]

    *) Modified the cache code to be header-location agnostic. Also
       fixed a number of other cache code bugs related to PR 15852.
       Includes a patch submitted by Sushma Rai <rsushma novell.com>.
       This fixes mod_mem_cache but not mod_disk_cache yet so I'm not
       closing the PR since that is what they are using. [Paul J. Reder]

    *) complain via error_log when mod_include's INCLUDES filter is
       enabled, but the relevant Options flag allowing the filter to run
       for the specific resource wasn't set, so that the filter won't
       silently get skipped. next remove itself, so the warning will be
       logged only once [Stas Bekman, Jeff Trawick, Bill Rowe]

    *) mod_info: HTML escape configuration information so it displays
       correctly. PR 24232. [Thom May]

    *) Restore the ability to add a description for directories that
       don't contain an index file.  (Broken in 2.0.48) [André Malo]

    *) Fix a problem with the display of empty variables ("SetEnv foo") in
       mod_include.  PR 24734  [Markus Julen <mj zermatt.net>]

    *) mod_log_config: Log the minutes component of the timezone correctly.
       PR 23642.  [Hong-Gunn Chew <hgbug gunnet.org>]

    *) mod_proxy: Fix cases where an invalid status-line could be sent
       to the client.  PR 23998.  [Joe Orton]

    *) mod_ssl: Fix segfaults at startup if other modules which use OpenSSL
       are also loaded.  [Joe Orton]

    *) mod_ssl: Use human-readable OpenSSL error strings in logs; use
       thread-safe interface for retrieving error strings.  [Joe Orton]

    *) mod_expires: Initialize ExpiresDefault to NULL instead of "" to
       avoid reporting an Internal Server error if it is used without
       having been set in the httpd.conf file. PR: 23748, 24459
       [Andre Malo, Liam Quinn  <liam htmlhelp.com>]

    *) mod_autoindex: Don't omit the <tr> start tag if the SuppressIcon
       option is set. PR 21668.  [Jesse Tie-Ten-Quee <highos highos.com>]

    *) mod_include no longer allows an ETag header on 304 responses.
       PR 19355. [Geoffrey Young <geoff apache.org>, André Malo]

    *) EBCDIC: Convert header fields to ASCII before sending (broken
       since 2.0.44). [Martin Kraemer]

    *) Fix the inability to log errors like exec failure in
       mod_ext_filter/mod_cgi script children.  This was broken after
       such children stopped inheriting the error log handle.
       [Jeff Trawick]

    *) Fix mod_info to use the real config file name, not the default
       config file name.  [Aryeh Katz <aryeh secured-services.com>]

    *) Set the scoreboard state to indicate logging prior to running
       logging hooks so that server-status will show 'L' for hung loggers
       instead of 'W'.  [Jeff Trawick]
    

- 漏洞信息

4182
Apache HTTP Server mod_ssl Plain HTTP Request DoS
Remote / Network Access Denial of Service
Loss of Availability
Exploit Public

- 漏洞描述

Apache contains a flaw that may allow a remote denial of service. The issue is triggered when a malicious user sends plain HTTP requests to the SSL port, which causes a memory leak in mod_ssl, and will result in loss of availability for the service.

- 时间线

2004-02-20 Unknow
2004-02-20 Unknow

- 解决方案

Upgrade to version 2.0.49 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Apache Mod_SSL HTTP Request Remote Denial Of Service Vulnerability
Design Error 9826
Yes No
2004-03-09 12:00:00 2009-07-12 03:06:00
Discovery of this vulnerability has been credited to Mick Wall <mick@mickandwendy.com>.

- 受影响的程序版本

Turbolinux Turbolinux Desktop 10.0
SGI ProPack 3.0
RedHat mod_ssl-2.0.40-21.i386.rpm
+ RedHat Linux 9.0 i386
RedHat httpd-manual-2.0.40-21.i386.rpm
+ RedHat Linux 9.0 i386
RedHat httpd-devel-2.0.40-21.i386.rpm
+ RedHat Linux 9.0 i386
RedHat httpd-2.0.40-21.i386.rpm
+ RedHat Linux 9.0 i386
HP HP-UX 11.23
HP HP-UX 11.22
HP HP-UX 11.11
HP HP-UX 11.0
Apple Mac OS X Server 10.3.3
Apple Mac OS X Server 10.2.8
Apple Mac OS X 10.3.3
Apple Mac OS X 10.2.8
Apache Software Foundation Apache 2.0.48
+ Mandriva Linux Mandrake 10.0 AMD64
+ Mandriva Linux Mandrake 10.0
+ S.u.S.E. Linux 8.1
+ S.u.S.E. Linux Personal 9.0 x86_64
+ S.u.S.E. Linux Personal 9.0
+ S.u.S.E. Linux Personal 8.2
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0
Apache Software Foundation Apache 2.0.47
+ Apple Mac OS X Server 10.3.5
+ Apple Mac OS X Server 10.3.4
+ Apple Mac OS X Server 10.3.3
+ Apple Mac OS X Server 10.3.2
+ Apple Mac OS X Server 10.3.1
+ Apple Mac OS X Server 10.3
+ Apple Mac OS X Server 10.2.8
+ Apple Mac OS X Server 10.2.7
+ Apple Mac OS X Server 10.2.6
+ Apple Mac OS X Server 10.2.5
+ Apple Mac OS X Server 10.2.4
+ Apple Mac OS X Server 10.2.3
+ Apple Mac OS X Server 10.2.2
+ Apple Mac OS X Server 10.2.1
+ Apple Mac OS X Server 10.2
+ Apple Mac OS X Server 10.1.5
+ Apple Mac OS X Server 10.1.4
+ Apple Mac OS X Server 10.1.3
+ Apple Mac OS X Server 10.1.2
+ Apple Mac OS X Server 10.1.1
+ Apple Mac OS X Server 10.1
+ Mandriva Linux Mandrake 9.2 amd64
+ Mandriva Linux Mandrake 9.2
+ Mandriva Linux Mandrake 9.1 ppc
+ Mandriva Linux Mandrake 9.1
Apache Software Foundation Apache 2.0.46
+ Red Hat Enterprise Linux AS 3
+ RedHat Desktop 3.0
+ RedHat Enterprise Linux ES 3
+ RedHat Enterprise Linux WS 3
+ Trustix Secure Linux 2.0
Apache Software Foundation Apache 2.0.45
- Apple Mac OS X 10.2.6
- Apple Mac OS X 10.2.5
- Apple Mac OS X 10.2.4
- Apple Mac OS X 10.2.3
- Apple Mac OS X 10.2.2
- Apple Mac OS X 10.2.1
- Apple Mac OS X 10.2
- Apple Mac OS X 10.1.5
- Apple Mac OS X 10.1.4
- Apple Mac OS X 10.1.3
- Apple Mac OS X 10.1.2
- Apple Mac OS X 10.1.1
- Apple Mac OS X 10.1
- Apple Mac OS X 10.1
- Apple Mac OS X 10.0.4
- Apple Mac OS X 10.0.3
- Apple Mac OS X 10.0.2
- Apple Mac OS X 10.0.1
- Apple Mac OS X 10.0
+ Conectiva Linux 9.0
Apache Software Foundation Apache 2.0.44
Apache Software Foundation Apache 2.0.43
Apache Software Foundation Apache 2.0.42
+ Gentoo Linux 1.4 _rc1
+ Gentoo Linux 1.2
Apache Software Foundation Apache 2.0.41
Apache Software Foundation Apache 2.0.40
+ RedHat Linux 9.0 i386
+ RedHat Linux 8.0
+ Terra Soft Solutions Yellow Dog Linux 3.0
Apache Software Foundation Apache 2.0.39
Apache Software Foundation Apache 2.0.38
Apache Software Foundation Apache 2.0.37
Apache Software Foundation Apache 2.0.36
Apache Software Foundation Apache 2.0.35
Apache Software Foundation Apache 2.0.49
+ S.u.S.E. Linux Personal 9.1
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0

- 不受影响的程序版本

Apache Software Foundation Apache 2.0.49
+ S.u.S.E. Linux Personal 9.1
+ Trustix Secure Linux 2.1
+ Trustix Secure Linux 2.0

- 漏洞讨论

mod_ssl has been reported to be prone to a remote denial of service vulnerability. It has been reported that the issue is as a result of a memory leak and will present itself when standard HTTP requests are handled on the SSL port of an affected Apache server.

- 漏洞利用

There is no exploit required.

- 解决方案

The vendor has addressed this issue, the fix is available through CVS at the following location:
http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/ssl/ssl_engine_io.c?r1=1.117&r2=1.118

This issue is also addressed in Apache 2.0.49.

Red Hat has released an advisory (RHSA-2004:182-01) and fixes to address this issue in Red Hat Linux 9. Red Hat Linux users are advised to see the referenced advisory for further details regarding obtaining and applying appropriate fixes.

Turbolinux have released a security advisory (TLSA-2004-11), and updates to address this issue in Turbolinux products. Users are advised to apply these updates as soon as possible, further details regarding obtaining and installing these updates can be found in the referenced advisory.

Gentoo has released advisory GLSA200403-04 to address this issue. Gentoo updates may be applied with the following commands:
emerge sync
emerge -pv ">=net-www/apache-2.0.49"
emerge ">=net-www/apache-2.0.49"

Additional details are included in the Gentoo advisory for users who are migrating from 2.0.48-r1 or earlier releases.

Netwosix Linux has released an advisory dealing with this issue. Please see the reference section for more details.

Trustix has released an advisory that includes updates for this issue.

Conectiva Linux has released an advisory CLSA-2004:839 with fixes to address this issue. Please see the referenced advisory for more information.

SUSE has released an advisory SuSE-SA:2004:009 to address this and other issues. Please see the advisory for more information.

HP has released security bulletin HPSBUX01022 dealing with this issue as well as fixes for their HP-UX architecture. Please see the referenced advisory for more information and details on obtaining fixes.

Apple has released security advisory APPLE-SA-2004-05-03 dealing with this and other issues. Please see the referenced advisory for more information.

Mandrakelinux has released an advisory MDKSA-2004:043 to address this issue. Please see the referenced advisory for more information.

RedHat has released an advisory FEDORA-2004-117 to address this issue in Fedora Core 1. Please see the referenced advisory for more information.

HP has released advisory HPSBTU01049 - SSRT4717 dealing with this and other issues. Please see the referenced advisory for more information.

SGI has released an advisory (20040506-01-U) with Patch 10075 for SGI ProPack 3 to address this and other issues. Please see the referenced advisory for more information.


RedHat httpd-manual-2.0.40-21.i386.rpm

RedHat httpd-2.0.40-21.i386.rpm

RedHat httpd-devel-2.0.40-21.i386.rpm

RedHat mod_ssl-2.0.40-21.i386.rpm

Turbolinux Turbolinux Desktop 10.0

Apple Mac OS X 10.2.8

Apple Mac OS X Server 10.2.8

Apple Mac OS X Server 10.3.3

Apple Mac OS X 10.3.3

Apache Software Foundation Apache 2.0.35

Apache Software Foundation Apache 2.0.36

Apache Software Foundation Apache 2.0.37

Apache Software Foundation Apache 2.0.38

Apache Software Foundation Apache 2.0.39

Apache Software Foundation Apache 2.0.40

Apache Software Foundation Apache 2.0.41

Apache Software Foundation Apache 2.0.42

Apache Software Foundation Apache 2.0.43

Apache Software Foundation Apache 2.0.44

Apache Software Foundation Apache 2.0.45

Apache Software Foundation Apache 2.0.46

Apache Software Foundation Apache 2.0.47

Apache Software Foundation Apache 2.0.48

SGI ProPack 3.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站