Lucene search

K
seebugRootSSV:429
HistoryNov 05, 2006 - 12:00 a.m.

Apache mod_rewrite模块单字节缓冲区溢出漏洞

2006-11-0500:00:00
Root
www.seebug.org
110

0.974 High

EPSS

Percentile

99.9%

Apache是一款开放源代码WEB服务程序。

Apache的mod_rewrite模块在转义绝对URI主题时存在单字节缓冲区溢出漏洞,攻击者可能利用此漏洞在服务器上执行任意指令。

mod_rewrite模块的escape_absolute_uri()函数分离LDAP URL中的令牌时,会导致在字符指针数组以外写入指向用户控制数据的指针,这样就可能完全控制受影响的主机。

Apache Group Apache 2.2.x >= 2.2.0
Apache Group Apache 2.0.x >= 2.0.46
Apache Group Apache 1.3.x >= 1.3.28
临时解决方法:

  • 禁用Apache的mod_rewrite模块。

厂商补丁:

Apache Group

目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

<a href=“http://httpd.apache.org/download.cgi” target=“_blank”>http://httpd.apache.org/download.cgi</a>

Debian

Debian已经为此发布了安全公告(DSA-1132-1, DSA-1131-1)以及相应补丁:
DSA-1132-1:New apache2 packages fix buffer overflow
链接:<a href=“http://www.debian.org/security/2005/dsa-1132” target=“_blank”>http://www.debian.org/security/2005/dsa-1132</a>

DSA-1131-1:New apache package fix buffer overflow
链接:<a href=“http://www.debian.org/security/2005/dsa-1131” target=“_blank”>http://www.debian.org/security/2005/dsa-1131</a>

Gentoo

Gentoo已经为此发布了一个安全公告(GLSA-200608-01)以及相应补丁:
GLSA-200608-01:Apache: Off-by-one flaw in mod_rewrite
链接:<a href=“http://security.gentoo.org/glsa/glsa-200608-01.xml” target=“_blank”>http://security.gentoo.org/glsa/glsa-200608-01.xml</a>

所有Apache用户都应升级到最新版本:

# emerge --sync
# emerge --ask --oneshot --verbose net-www/apache

                                                #!/bin/sh
# Exploit for Apache mod_rewrite off-by-one.
# Vulnerability discovered by Mark Dowd.
# CVE-2006-3747
#
# by jack &lt;jack\x40gulcas\x2Eorg&gt;
# 2006-08-20
#
# Thx to xuso for help me