Users login

Create an account »

JOIN XATRIX

Users login

Home » Security Advisories» FreeBSD » Apache httpd meta-character escaping

Apache httpd meta-character escaping

A bug was found in the apache daemon that may allow remote users to obtain unauthorized access to a machine running apache httpd.

  • Vendor: FreeBSD
  • Vendor ID: FreeBSD-SA-96:02
  • Date: April 22, 1996


-----BEGIN PGP SIGNED MESSAGE-----

=======================================================================
FreeBSD-SA-96:02 Security Advisory
FreeBSD, Inc.

Topic: apache httpd meta-character escaping

Category: port
Module: apache
Announced: 1996-04-22
Affects: FreeBSD 2.0.5 and 2.1.0 ports/packages distributions
with apache http daemon installed an enabled
Corrected: 1996-04-21 ports source code
Source: Generic apache distribution bug
FreeBSD only: no

Reference: CERT Advisory CA-96.06.cgi_example_code
(warning: CERT's advisory is incomplete)

Patches: no patches available, see below for update

=======================================================================

I. Background

A bug was found in the apache daemon that may allow remote
users to obtain unauthorized access to a machine running
apache httpd.


II. Problem Description

Versions of the apache http daemon before release 1.05 do
not properly restrict shell meta-characters transmitted to
the daemon via form input (via GET or POST).


III. Impact

The problem could allow remote users to gain unauthorized access
to a system. This problem is only exploitable on systems where
the apache http daemon has been installed and is enabled.

The apache http daemon is not installed or enabled by default
but is a common package that many FreeBSD users may have chosen
to install.

IV. Solution(s)

The Apache Group released version 1.05 of the daemon which fixes
this vulnerability. The FreeBSD Project updated the ports and
packages system to use this new daemon.

Interested parties may obtain an updated pre-compiled FreeBSD
package from:

ftp://ftp.freebsd.org/pub/FreeBSD/packages-current/www/apache-1.0.5.tgz

and an updated "automatic port" from the directory hierarchy:

ftp://ftp.freebsd.org/pub/FreeBSD/ports-current/www/apache.tar.gz

V. Workaround

This vulnerability can only be eliminated by updating to a more recent
version of apache or by disabling apache httpd.


=======================================================================
FreeBSD, Inc.

Web Site: http://www.freebsd.org/
Confidential contacts: [email protected]
PGP Key: ftp://freebsd.org/pub/CERT/public_key.asc
Security notifications: [email protected]
Security public discussion: [email protected]

Notice: Any patches in this document may not apply cleanly due to
modifications caused by digital signature or mailer software.
Please reference the URL listed at the top of this document
for original copies of all patches if necessary.
=======================================================================

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMaLAi1UuHi5z0oilAQHqiQP/VKL3RhyNc3jmYyH6ydteiQUQ1+t7boqr
304LP9g3ifq/cdxDwjbR4joiVjTNsqvOE1LQryI0qHq6nFPqGBsnHZI+thYGNYdI
rjKOMRPF2VbzFx0W7mdvnQLxfCcU8Ma3A0zlub5hhqvN2gg3RVTXNYnF2FHIFL77
cVdx+nVibo8=
=tNpA
-----END PGP SIGNATURE-----

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »