Category Archives: Apache

Apache Security

[ANNOUNCEMENT] Apache HTTP Server 2.4.3 Released

               Apache HTTP Server 2.4.3 Released

  The Apache Software Foundation and the Apache HTTP Server Project
  are pleased to announce the release of version 2.4.3 of the Apache
  HTTP Server ("Apache").  This version of Apache is our 3rd GA
  release of the new generation 2.4.x branch of Apache HTTPD and
  represents fifteen years of innovation by the project, and is
  recommended over all previous releases. This version of Apache is
  principally a security and bug fix release, including the following
  2 security fixes:

   *) SECURITY: CVE-2012-3502  (cve.mitre.org)
      mod_proxy_ajp, mod_proxy_http: Fix an issue in back end
      connection closing which could lead to privacy issues due
      to a response mixup. PR 53727.

   *) SECURITY: CVE-2012-2687 (cve.mitre.org)
      mod_negotiation: Escape filenames in variant list to prevent an
      possible XSS for a site where untrusted users can upload files to
      a location with MultiViews enabled.

  Apache HTTP Server 2.4.3 is available for download from:

    http://httpd.apache.org/download.cgi

  Apache 2.4 offers numerous enhancements, improvements, and performance
  boosts over the 2.2 codebase.  For an overview of new features
  introduced since 2.4 please see:

    http://httpd.apache.org/docs/trunk/new_features_2_4.html

  Please see the CHANGES_2.4 file, linked from the download page, for a
  full list of changes. A condensed list, CHANGES_2.4.3 includes only
  those changes introduced since the prior 2.4 release.  A summary of all 
  of the security vulnerabilities addressed in this and earlier releases 
  is available:

    http://httpd.apache.org/security/vulnerabilities_24.html

  This release requires the Apache Portable Runtime (APR) version 1.4.x
  and APR-Util version 1.4.x. The APR libraries must be upgraded for all
  features of httpd to operate correctly.

  This release builds on and extends the Apache 2.2 API.  Modules written
  for Apache 2.2 will need to be recompiled in order to run with Apache
  2.4, and require minimal or no source code changes.

    http://svn.apache.org/repos/asf/httpd/httpd/trunk/VERSIONING

  When upgrading or installing this version of Apache, please bear in mind
  that if you intend to use Apache with one of the threaded MPMs (other
  than the Prefork MPM), you must ensure that any modules you will be
  using (and the libraries they depend on) are thread-safe.

  NOTE to Windows users: The issues with AcceptFilter None replacing
       Win32DisableAcceptEx appears to have resolved starting with version
       2.4.3 make Apache httpd 2.4.x suitable for Windows servers.



CVE-2012-0883

envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl. (CVSS:6.9) (Last Update:2013-09-17)

[ANNOUNCEMENT] Apache HTTP Server 2.4.2 Released

          Apache HTTP Server 2.4.2 Released

The Apache Software Foundation and the Apache HTTP Server Project
are pleased to announce the release of version 2.4.2 of the Apache
HTTP Server ("Apache").  This version of Apache is our 2nd GA
release of the new generation 2.4.x branch of Apache HTTPD and
represents fifteen years of innovation by the project, and is
recommended over all previous releases. This version of Apache is
principally a security and bug fix release, including the following
security fix:

*) SECURITY: CVE-2012-0883 (cve.mitre.org)
  envvars: Fix insecure handling of LD_LIBRARY_PATH that could
  lead to the current working directory to be searched for DSOs.

Apache HTTP Server 2.4.2 is available for download from:

http://httpd.apache.org/download.cgi

Apache 2.4 offers numerous enhancements, improvements, and performance
boosts over the 2.2 codebase.  For an overview of new features
introduced since 2.4 please see:

http://httpd.apache.org/docs/trunk/new_features_2_4.html

Please see the CHANGES_2.4 file, linked from the download page, for a
full list of changes. A condensed list, CHANGES_2.4.2 includes only
those changes introduced since the prior 2.4 release.  A summary of all 
of the security vulnerabilities addressed in this and earlier releases 
is available:

http://httpd.apache.org/security/vulnerabilities_24.html

This release requires the Apache Portable Runtime (APR) version 1.4.x
and APR-Util version 1.4.x. The APR libraries must be upgraded for all
features of httpd to operate correctly.

This release builds on and extends the Apache 2.2 API.  Modules written
for Apache 2.2 will need to be recompiled in order to run with Apache
2.4, and require minimal or no source code changes.

http://svn.apache.org/repos/asf/httpd/httpd/trunk/VERSIONING

When upgrading or installing this version of Apache, please bear in mind
that if you intend to use Apache with one of the threaded MPMs (other
than the Prefork MPM), you must ensure that any modules you will be
using (and the libraries they depend on) are thread-safe.

NOTE to Windows users: AcceptFilter None has replaced Win32DisableAcceptEx 
  and the feature appears to have interoperability issues with mod_ssl.
  Apache 2.4.2 may not yet be suitable for all Windows servers.  There 
  is not yet a Windows binary distribution of httpd 2.4, but this is
  expected to be remedied soon as various dependencies graduate from
  beta to GA.



孔子文化暨总裁智慧(EMBA)Course高级研修班邀请函

2012年5月19-21日在桂林举办的中华全国(含港澳台)第一届孔子文化暨总裁智慧(EMBA)Course高级研修班,向您郑重发出邀请,直接点击链接http://www.zhkzwhyj.com/yjy/html/?85.html或登录“中华孔子文化研究会”官网:http://www.zhkzwhyj.com查看详情。祝您吉祥安康,万事如意!

CVE-2012-1181

fcgid_spawn_ctl.c in the mod_fcgid module 2.3.6 for the Apache HTTP Server does not recognize the FcgidMaxProcessesPerClass directive for a virtual host, which makes it easier for remote attackers to cause a denial of service (memory consumption) via a series of HTTP requests that triggers a process count higher than the intended limit. (CVSS:5.0) (Last Update:2012-09-07)

[ANNOUNCEMENT] Apache HTTP Server 2.4.1 Released

              Apache HTTP Server 2.4.1 Released

The Apache Software Foundation and the Apache HTTP Server Project are
pleased to announce the GA release of version 2.4.1 of the Apache HTTP
Server. This version of Apache HTTP Server is the first GA release of
the new 2.4.x branch.

Apache HTTP Server 2.4 provides a number of improvements and
enhancements over the 2.2 version. A listing and description of these
features is available via:

  http://httpd.apache.org/docs/2.4/new_features_2_4.html

Please see the CHANGES_2.4 file, linked from the download page, for a
full list of changes.

We consider this release to be the best version of Apache HTTP Server
available, and encourage users of all prior versions to upgrade.
Apache HTTP Server 2.4.1 is available for download from:

  http://httpd.apache.org/download.cgi

This release requires the Apache Portable Runtime (APR) version 1.4.x
and APR-Util version 1.4.x. The APR libraries must be upgraded for all
features of httpd to operate correctly.

This release builds on and extends the Apache 2.2 API. Modules written
for Apache 2.2 will need to be recompiled in order to run with Apache
2.4, and may require minimal source code changes.

  http://httpd.apache.org/docs/2.4/developer/new_api_2_4.html

A summary of all of the security vulnerabilities addressed in this and
earlier releases is available:

  http://httpd.apache.org/security/vulnerabilities_24.html

Important:
Windows users: AcceptFilter None has replaced Win32DisableAcceptEx 
and the feature appears to have interoperability issues with mod_ssl.
Apache 2.4.1 may not yet be suitable for all Windows servers.  There 
is not yet a Windows binary distribution of httpd 2.4, but this is
expected to be remedied soon as various dependencies graduate from
beta to GA.



Apache HTTP Server 2.2.22 Released

                       Apache HTTP Server 2.2.22 Released

   The Apache Software Foundation and the Apache HTTP Server Project are
   pleased to announce the release of version 2.2.22 of the Apache HTTP
   Server ("Apache").  This version of Apache is principally a security
   and bug fix release, including the following significant security fixes:

   * SECURITY: CVE-2011-3368 (cve.mitre.org)
     Reject requests where the request-URI does not match the HTTP
     specification, preventing unexpected expansion of target URLs in
     some reverse proxy configurations.

   * SECURITY: CVE-2011-3607 (cve.mitre.org)
     Fix integer overflow in ap_pregsub() which, when the mod_setenvif module
     is enabled, could allow local users to gain privileges via a .htaccess
     file.

   * SECURITY: CVE-2011-4317 (cve.mitre.org)
     Resolve additional cases of URL rewriting with ProxyPassMatch or
     RewriteRule, where particular request-URIs could result in undesired
     backend network exposure in some configurations.

   * SECURITY: CVE-2012-0021 (cve.mitre.org)
     mod_log_config: Fix segfault (crash) when the '%{cookiename}C' log format
     string is in use and a client sends a nameless, valueless cookie, causing
     a denial of service. The issue existed since version 2.2.17.

   * SECURITY: CVE-2012-0031 (cve.mitre.org)
     Fix scoreboard issue which could allow an unprivileged child process
     could cause the parent to crash at shutdown rather than terminate
     cleanly.

   * SECURITY: CVE-2012-0053 (cve.mitre.org)
     Fixed an issue in error responses that could expose "httpOnly" cookies
     when no custom ErrorDocument is specified for status code 400.

   The Apache HTTP Project thanks halfdog, Context Information Security Ltd,
   Prutha Parikh of Qualys, and Norman Hippert for bringing these issues to
   the attention of the security team.

   We consider this release to be the best version of Apache available, and
   encourage users of all prior versions to upgrade.

   Apache HTTP Server 2.2.22 is available for download from:

     http://httpd.apache.org/download.cgi

   Please see the CHANGES_2.2 file, linked from the download page, for a
   full list of changes.  A condensed list, CHANGES_2.2.22 includes only
   those changes introduced since the prior 2.2 release.  A summary of all
   of the security vulnerabilities addressed in this and earlier releases
   is available:

     http://httpd.apache.org/security/vulnerabilities_22.html

   This release includes the Apache Portable Runtime (APR) version 1.4.5
   and APR Utility Library (APR-util) version 1.4.2, bundled with the tar
   and zip distributions.  The APR libraries libapr and libaprutil (and
   on Win32, libapriconv version 1.2.1) must all be updated to ensure
   binary compatibility and address many known security and platform bugs.
   APR-util version 1.4 represents a minor version upgrade from earlier
   httpd source distributions, which previously included version 1.3.

   Apache 2.2 offers numerous enhancements, improvements, and performance
   boosts over the 2.0 codebase.  For an overview of new features
   introduced since 2.0 please see:

     http://httpd.apache.org/docs/2.2/new_features_2_2.html

   This release builds on and extends the Apache 2.0 API.  Modules written
   for Apache 2.0 will need to be recompiled in order to run with Apache
   2.2, and require minimal or no source code changes.

     http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/VERSIONING

   When upgrading or installing this version of Apache, please bear in mind
   that if you intend to use Apache with one of the threaded MPMs (other
   than the Prefork MPM), you must ensure that any modules you will be
   using (and the libraries they depend on) are thread-safe.



CVE-2012-0053

protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script. (CVSS:4.3) (Last Update:2013-10-10)

CVE-2012-0021

The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value. (CVSS:2.6) (Last Update:2013-10-10)

CVE-2012-0031

scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function. (CVSS:4.6) (Last Update:2013-10-10)