patches for easier mirroring, to eliminate a special copy, to make www.freebsd.org/security a full copy of security.freebsd.org and be eventually be the same. For now files are just sitting there. The symlinks are missing. Discussed on: www (repository location) Discussed with: simon (so)
		
			
				
	
	
		
			93 lines
		
	
	
	
		
			3 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
			
		
		
	
	
			93 lines
		
	
	
	
		
			3 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
| -----BEGIN PGP SIGNED MESSAGE-----
 | |
| 
 | |
| =============================================================================
 | |
| FreeBSD-SA-96:02					    Security Advisory
 | |
| 								FreeBSD, Inc.
 | |
| 
 | |
| Topic:		apache httpd meta-character escaping
 | |
| 
 | |
| Category:	port
 | |
| Module:		apache
 | |
| Announced:	1996-04-22
 | |
| Affects:	FreeBSD 2.0.5 and 2.1.0 ports/packages distributions
 | |
| 		with apache http daemon installed an enabled
 | |
| Corrected:	1996-04-21 ports source code
 | |
| Source:		Generic apache distribution bug
 | |
| FreeBSD only:	no
 | |
| 
 | |
| Reference:	CERT Advisory CA-96.06.cgi_example_code
 | |
| 		(warning: CERT's advisory is incomplete)
 | |
| 
 | |
| Patches:	no patches available, see below for update
 | |
| 
 | |
| =============================================================================
 | |
| 
 | |
| I.   Background    
 | |
| 
 | |
|      A bug was found in the apache daemon that may allow remote
 | |
|      users to obtain unauthorized access to a machine running
 | |
|      apache httpd.
 | |
| 
 | |
| 
 | |
| II.  Problem Description
 | |
| 
 | |
|      Versions of the apache http daemon before release 1.05 do
 | |
|      not properly restrict shell meta-characters transmitted to
 | |
|      the daemon via form input (via GET or POST).
 | |
| 
 | |
| 
 | |
| III. Impact
 | |
| 
 | |
|      The problem could allow remote users to gain unauthorized access
 | |
|      to a system.  This problem is only exploitable on systems where
 | |
|      the apache http daemon has been installed and is enabled.
 | |
| 
 | |
|      The apache http daemon is not installed or enabled by default
 | |
|      but is a common package that many FreeBSD users may have chosen
 | |
|      to install.
 | |
| 
 | |
| IV. Solution(s)
 | |
| 
 | |
|      The Apache Group released version 1.05 of the daemon which fixes
 | |
|      this vulnerability.  The FreeBSD Project updated the ports and
 | |
|      packages system to use this new daemon.
 | |
| 
 | |
|      Interested parties may obtain an updated pre-compiled FreeBSD
 | |
|      package from:
 | |
| 
 | |
|      ftp://ftp.freebsd.org/pub/FreeBSD/packages-current/www/apache-1.0.5.tgz
 | |
| 
 | |
|      and an updated "automatic port" from the directory hierarchy:
 | |
| 
 | |
|      ftp://ftp.freebsd.org/pub/FreeBSD/ports-current/www/apache.tar.gz
 | |
| 
 | |
| V. Workaround
 | |
| 
 | |
|      This vulnerability can only be eliminated by updating to a more recent
 | |
|      version of apache or by disabling apache httpd.
 | |
| 
 | |
| 
 | |
| =============================================================================
 | |
| FreeBSD, Inc.
 | |
| 
 | |
| Web Site:			http://www.freebsd.org/
 | |
| Confidential contacts:		security-officer@freebsd.org
 | |
| PGP Key:			ftp://freebsd.org/pub/CERT/public_key.asc
 | |
| Security notifications:		security-notifications@freebsd.org
 | |
| Security public discussion:	security@freebsd.org
 | |
| 
 | |
| Notice: Any patches in this document may not apply cleanly due to
 | |
| 	modifications caused by digital signature or mailer software.
 | |
| 	Please reference the URL listed at the top of this document
 | |
| 	for original copies of all patches if necessary.
 | |
| =============================================================================
 | |
| 
 | |
| -----BEGIN PGP SIGNATURE-----
 | |
| Version: 2.6.2
 | |
| 
 | |
| iQCVAwUBMaLAi1UuHi5z0oilAQHqiQP/VKL3RhyNc3jmYyH6ydteiQUQ1+t7boqr
 | |
| 304LP9g3ifq/cdxDwjbR4joiVjTNsqvOE1LQryI0qHq6nFPqGBsnHZI+thYGNYdI
 | |
| rjKOMRPF2VbzFx0W7mdvnQLxfCcU8Ma3A0zlub5hhqvN2gg3RVTXNYnF2FHIFL77
 | |
| cVdx+nVibo8=
 | |
| =tNpA
 | |
| -----END PGP SIGNATURE-----
 |