Users login

Create an account »


Users login

Home » Hacking News » MDKSA-2002:048-mod_ssl


by Nikola Strahija on August 9th, 2002 Frank Denis discovered an off-by-one error in mod_ssl dealing with the handling of older configuration directorives (the rewrite_command hook). A malicious user could use a specially-crafted .htaccess file to execute arbitrary commands as the apache user or execute a DoS against the apache child processes. This vulnerability is fixed in mod_ssl 2.8.10; patches have been applied to correct this problem in these packages.


Updated Packages:

Linux-Mandrake 7.1:
8f336f83c0ad7ba0f21da3f805839b77 7.1/RPMS/mod_ssl-2.8.5-3.1mdk.i586.rpm
9f28eb3330d357a7bb7e27fb16da757b 7.1/SRPMS/mod_ssl-2.8.5-3.1mdk.src.rpm

Linux-Mandrake 7.2:
39ce2c8b476fd8069c8f0fe7aedbef21 7.2/RPMS/mod_ssl-2.8.5-3.1mdk.i586.rpm
9f28eb3330d357a7bb7e27fb16da757b 7.2/SRPMS/mod_ssl-2.8.5-3.1mdk.src.rpm

Mandrake Linux 8.0:
3f8e7d148ea509d27d0e59587ac86602 8.0/RPMS/mod_ssl-2.8.5-3.1mdk.i586.rpm
9f28eb3330d357a7bb7e27fb16da757b 8.0/SRPMS/mod_ssl-2.8.5-3.1mdk.src.rpm

Mandrake Linux 8.0/ppc:
d9e727172d7147dc3ec9140c24fcacff ppc/8.0/RPMS/mod_ssl-2.8.5-3.1mdk.ppc.rpm
9f28eb3330d357a7bb7e27fb16da757b ppc/8.0/SRPMS/mod_ssl-2.8.5-3.1mdk.src.rpm

Mandrake Linux 8.1:
7817c09901d4be439fd00bfd4cf9cc1b 8.1/RPMS/mod_ssl-2.8.5-3.1mdk.i586.rpm
9f28eb3330d357a7bb7e27fb16da757b 8.1/SRPMS/mod_ssl-2.8.5-3.1mdk.src.rpm

Mandrake Linux 8.1/ia64:
f55a946cac1b64bf4c9b1952aa9b779a ia64/8.1/RPMS/mod_ssl-2.8.5-3.1mdk.ia64.rpm
9f28eb3330d357a7bb7e27fb16da757b ia64/8.1/SRPMS/mod_ssl-2.8.5-3.1mdk.src.rpm

Mandrake Linux 8.2:
406eee7d9607cf40f5cea3376fe38697 8.2/RPMS/mod_ssl-2.8.7-3.1mdk.i586.rpm
9e421423dc9cef30f0a1b04a49ab87da 8.2/SRPMS/mod_ssl-2.8.7-3.1mdk.src.rpm

Mandrake Linux 8.2/ppc:
01fc7c44707f19136d6f31b75ad754e1 ppc/8.2/RPMS/mod_ssl-2.8.7-3.1mdk.ppc.rpm
9e421423dc9cef30f0a1b04a49ab87da ppc/8.2/SRPMS/mod_ssl-2.8.7-3.1mdk.src.rpm

Corporate Server 1.0.1:
8f336f83c0ad7ba0f21da3f805839b77 1.0.1/RPMS/mod_ssl-2.8.5-3.1mdk.i586.rpm
9f28eb3330d357a7bb7e27fb16da757b 1.0.1/SRPMS/mod_ssl-2.8.5-3.1mdk.src.rpm

Single Network Firewall 7.2:
b22c66c49703a46c10507da989e72948 snf7.2/RPMS/mod_ssl-2.8.4-5.1mdk.i586.rpm
6bf148ae0fe73cd6874d6c08b711ae10 snf7.2/SRPMS/mod_ssl-2.8.4-5.1mdk.src.rpm

Bug IDs fixed (see for more information):


To upgrade automatically, use MandrakeUpdate. The verification of md5
checksums and GPG signatures is performed automatically for you.

If you want to upgrade manually, download the updated package from one
of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". A list of
FTP mirrors can be obtained from:

Please verify the update prior to upgrading to ensure the integrity of
the downloaded package. You can do this with the command:

rpm --checksig

All packages are signed by MandrakeSoft for security. You can obtain
the GPG public key of the Mandrake Linux Security Team from:

Please be aware that sometimes it takes the mirrors a few hours to

You can view other update advisories for Mandrake Linux at:

MandrakeSoft has several security-related mailing list services that
anyone can subscribe to. Information on these lists can be obtained by

If you want to report vulnerabilities, please contact

[email protected]

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.


Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »