Category Archives: Apache

Apache Security

[Announcement] Apache HTTP Server 2.0.65 Released

                       Apache HTTP Server 2.0.65 Released

   The Apache Software Foundation and the Apache HTTP Server Project are
   pleased to announce the final 2.0 release version 2.0.65 of the
   Apache HTTP Server ("Apache").  This version of Apache will be the
   last 2.0 bug and security fix release, covering many but not all
   issues addressed in the stable 2.4 and legacy 2.2 released versions:

   CVE-2013-1862 (cve.mitre.org)
     mod_rewrite: Ensure that client data written to the RewriteLog is
     escaped to prevent terminal escape sequences from entering the
     log file.

    CVE-2012-0053 (cve.mitre.org)
     Fix an issue in error responses that could expose "httpOnly"
    cookies when no custom ErrorDocument is specified for status code
    400.

    CVE-2012-0031 (cve.mitre.org)
     Fix scoreboard issue which could allow an unprivileged child
    process to cause the parent to crash at shutdown rather than
    terminate cleanly.

    CVE-2011-3368 (cve.mitre.org)
     Reject requests where the request-URI does not match the HTTP
     specification, preventing unexpected expansion of target URLs in
     some reverse proxy configurations.

    CVE-2011-3192 (cve.mitre.org)
     core: Fix handling of byte-range requests to use less memory, to
    avoid denial of service. If the sum of all ranges in a request is
    larger than the original file, ignore the ranges and send the
    complete file.

    CVE-2011-3607 (cve.mitre.org)
     Fix integer overflow in ap_pregsub() which, when the mod_setenvif
    module is enabled, could allow local users to gain privileges via
    a .htaccess file.

       NOTE: it remains possible to exhaust all memory using a carefully
       crafted .htaccess rule, which will not be addressed in 2.0;
       enabling processing of .htaccess files authored by untrusted
       users is the root of such security risks.  Upgrade to httpd
       2.2.25 or later to limit this specific risk.

   The Apache HTTP Project thanks Ramiro Molina, Norman Hippert,
   halfdog, and Context Information Security Ltd for bringing these
   issues to the attention of the project security team.

   Apache HTTP Server 2.0.65, as well as the current stable release 2.4
   and legacy release 2.2 are available for download from;

           http://httpd.apache.org/download.cgi

   Please see the CHANGES_2.0 file, linked from the above page, for a
   full list of changes. A condensed list, CHANGES_2.0.65 provides the
   complete list of changes since 2.0.64.  A summary of the security
   vulnerabilities addressed in this and earlier releases is available:

     http://httpd.apache.org/security/vulnerabilities_20.html

   This release includes the Apache Portable Runtime (APR) release
   0.9.20, and APR Utility Library (APR-util) release 0.9.19, bundled
   with the tar and zip distributions.  The APR libraries libapr and
   libaprutil (and on Win32, libiconv version 0.9.7) must all be
   updated to ensure binary compatibility and address many known
   platform bugs.

   This release is compatible with modules compiled for 2.0.42 and later
   versions.  The Apache HTTP Project developers strongly encourages all
   users to migrate to Apache stable release 2.4 or at minimum version
   the legacy release 2.2 as quickly as possible, as no further
   maintenance will be performed on this historical version 2.0.


CVE-2013-1896

mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI. (CVSS:4.3) (Last Update:2014-03-05)

CVE-2013-1862

mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator. (CVSS:5.1) (Last Update:2014-03-05)

Apache HTTP Server 2.2.24 Released

   The Apache Software Foundation and the Apache HTTP Server Project are
   pleased to announce the release of version 2.2.24 of the Apache HTTP
   Server ("Apache").  This version of Apache is principally a security
   and bug fix maintenance release, including the following significant
   security fixes:

   * SECURITY: CVE-2012-3499 (cve.mitre.org)
     Various XSS flaws due to unescaped hostnames and URIs HTML output in
     mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp.

   * SECURITY: CVE-2012-4558 (cve.mitre.org)
     XSS in mod_proxy_balancer manager interface.

   We consider the Apache HTTP Server 2.4.4 release to be the best version
   of Apache available, and encourage users of 2.2 and all prior versions
   to upgrade.  This 2.2 maintenance release is offered for those unable
   to do so at this time.  For further details, see

     http://www.apache.org/dist/httpd/Announcement2.4.txt

   Apache HTTP Server 2.4.4 and 2.2.24 are available for download from:

     http://httpd.apache.org/download.cgi

   Please see the CHANGES_2.2 file, linked from the download page, for a
   full list of changes.  A condensed list, CHANGES_2.2.24 includes only
   those changes introduced since the prior 2.2 release.  A summary of all 
   of the security vulnerabilities addressed in this and earlier releases 
   is available:

     http://httpd.apache.org/security/vulnerabilities_22.html

   This release includes the Apache Portable Runtime (APR) version 1.4.6
   and APR Utility Library (APR-util) version 1.4.1, bundled with the tar
   and zip distributions.  The APR libraries libapr and libaprutil (and
   on Win32, libapriconv version 1.2.1) must all be updated to ensure
   binary compatibility and address many known security and platform bugs.
   APR-util version 1.4 represents a minor version upgrade from earlier
   httpd source distributions, which previously included version 1.3.

   This release builds on and extends the Apache 2.0 API and is superceeded
   by the Apache 2.4 API.  Modules written for Apache 2.0 or 2.4 will need
   to be recompiled in order to run with Apache 2.2, and most will require
   minimal or no source code changes.

   When upgrading or installing this version of Apache, please bear in mind
   that if you intend to use Apache with one of the threaded MPMs (other
   than the Prefork MPM), you must ensure that any modules you will be
   using (and the libraries they depend on) are thread-safe.



CVE-2012-3499

Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules. (CVSS:4.3) (Last Update:2014-01-17)

CVE-2012-4558

Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string. (CVSS:4.3) (Last Update:2014-01-17)

[ANNOUNCE] Apache HTTP Server 2.4.4 Released


               Apache HTTP Server 2.4.4 Released

  The Apache Software Foundation and the Apache HTTP Server Project
  are pleased to announce the release of version 2.4.4 of the Apache
  HTTP Server ("Apache").  This version of Apache is our latest GA
  release of the new generation 2.4.x branch of Apache HTTPD and
  represents fifteen years of innovation by the project, and is
  recommended over all previous releases. This version of Apache is
  principally a security and bug fix release, including the following
  2 security fixes:

   *) SECURITY: CVE-2012-3499 (cve.mitre.org)
      Various XSS flaws due to unescaped hostnames and URIs HTML output in
      mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp.

   *) SECURITY: CVE-2012-4558 (cve.mitre.org)
      XSS in mod_proxy_balancer manager interface.

  Apache HTTP Server 2.4.4 is available for download from:

    http://httpd.apache.org/download.cgi

  Apache 2.4 offers numerous enhancements, improvements, and performance
  boosts over the 2.2 codebase.  For an overview of new features
  introduced since 2.4 please see:

    http://httpd.apache.org/docs/trunk/new_features_2_4.html

  Please see the CHANGES_2.4 file, linked from the download page, for a
  full list of changes. A condensed list, CHANGES_2.4.4 includes only
  those changes introduced since the prior 2.4 release.  A summary of all 
  of the security vulnerabilities addressed in this and earlier releases 
  is available:

    http://httpd.apache.org/security/vulnerabilities_24.html

  This release requires the Apache Portable Runtime (APR) version 1.4.x
  and APR-Util version 1.4.x. The APR libraries must be upgraded for all
  features of httpd to operate correctly.

  This release builds on and extends the Apache 2.2 API.  Modules written
  for Apache 2.2 will need to be recompiled in order to run with Apache
  2.4, and require minimal or no source code changes.

    http://svn.apache.org/repos/asf/httpd/httpd/trunk/VERSIONING

  When upgrading or installing this version of Apache, please bear in mind
  that if you intend to use Apache with one of the threaded MPMs (other
  than the Prefork MPM), you must ensure that any modules you will be
  using (and the libraries they depend on) are thread-safe.



CVE-2012-4557

The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request. (CVSS:5.0) (Last Update:2013-12-05)

CVE-2012-2687

Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list. (CVSS:2.6) (Last Update:2013-12-05)

CVE-2012-3502

The proxy functionality in (1) mod_proxy_ajp.c in the mod_proxy_ajp module and (2) mod_proxy_http.c in the mod_proxy_http module in the Apache HTTP Server 2.4.x before 2.4.3 does not properly determine the situations that require closing a back-end connection, which allows remote attackers to obtain sensitive information in opportunistic circumstances by reading a response that was intended for a different client. (CVSS:4.3) (Last Update:2013-04-18)