Apache mod_rewrite LDAP URL buffer overflow

2007-06-22T00:00:00
ID SAINT:B572402CE6E5C851D7572BF044507A14
Type saint
Reporter SAINT Corporation
Modified 2007-06-22T00:00:00

Description

Added: 06/22/2007
CVE: CVE-2006-3747
BID: 19204
OSVDB: 27588

Background

mod_rewrite is an Apache module which allows rule-based modification of URL requests.

Problem

An off-by-one buffer overflow vulnerability in mod_rewrite allows command execution when the **escape_absolute_uri** function attempts to separate tokens within an LDAP URL.

Resolution

Upgrade to Apache HTTP Server version 1.3.37, 2.0.59, or 2.2.3 or higher.

References

<http://archives.neohapsis.com/archives/bugtraq/2006-07/0514.html>
<http://www.kb.cert.org/vuls/id/395412>

Limitations

Exploit works on Apache HTTP Server 2.0.58. The vulnerability is only exploitable when there exists a rule where the user can control the initial part of the rewritten URL. The rule must not contain a forbidden or gone flag [F or G] or the "noescape" [NE] flag.

Platforms

Windows