patches for easier mirroring, to eliminate a special copy, to make www.freebsd.org/security a full copy of security.freebsd.org and be eventually be the same. For now files are just sitting there. The symlinks are missing. Discussed on: www (repository location) Discussed with: simon (so)
		
			
				
	
	
		
			104 lines
		
	
	
	
		
			4 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
			
		
		
	
	
			104 lines
		
	
	
	
		
			4 KiB
		
	
	
	
		
			Text
		
	
	
	
	
	
| -----BEGIN PGP SIGNED MESSAGE-----
 | |
| 
 | |
| =============================================================================
 | |
| FreeBSD-SA-02:03                                            Security Advisory
 | |
|                                                                 FreeBSD, Inc.
 | |
| 
 | |
| Topic:          mod_auth_pgsql port authentication bypass
 | |
| 
 | |
| Category:       ports
 | |
| Module:         mod_auth_pgsql
 | |
| Announced:      2002-01-04
 | |
| Credits:        RUS CERT <URL:http://cert.uni-stuttgart.de/>
 | |
| Affects:        Ports collection prior to the correction date
 | |
| Corrected:      2001-10-02 11:33:49 UTC
 | |
| FreeBSD only:   NO
 | |
| 
 | |
| I.   Background
 | |
| 
 | |
| mod_auth_pgsql is an Apache module which allows the Apache web server
 | |
| to use a PostgreSQL database for user and/or group authentication.
 | |
| 
 | |
| II.  Problem Description
 | |
| 
 | |
| The mod_auth_pgsql port, versions prior to mod_auth_pgsql-0.9.9,
 | |
| contain a vulnerability that may allow a remote user to cause
 | |
| arbitrary SQL code to be execute.  mod_auth_pgsql constructs a SQL
 | |
| statement to be executed by the PostgreSQL server in order to lookup
 | |
| user information.  The username given by the remote user is inserted
 | |
| into the SQL statement without any quoting or other safety checks.
 | |
| 
 | |
| The mod_auth_pgsql port is not installed by default, nor is it "part of
 | |
| FreeBSD" as such: it is part of the FreeBSD ports collection, which
 | |
| contains over 6000 third-party applications in a ready-to-install
 | |
| format. The ports collection shipped with FreeBSD 4.4 contains this
 | |
| problem since it was discovered after the release.
 | |
| 
 | |
| FreeBSD makes no claim about the security of these third-party
 | |
| applications, although an effort is underway to provide a security
 | |
| audit of the most security-critical ports.
 | |
| 
 | |
| III. Impact
 | |
| 
 | |
| A remote user may insert arbitrary SQL code into the username during
 | |
| authentication, leading to several exploit opportunities.  In
 | |
| particular, the attacker may cause mod_auth_pgsql to use a known fixed
 | |
| password hash for user verification, allowing him to authenticate as
 | |
| any user and obtain unauthorized access to web server data.
 | |
| 
 | |
| IV.  Workaround
 | |
| 
 | |
| 1) Deinstall the mod_auth_pgsql port/package if you have it installed.
 | |
| 
 | |
| V.   Solution
 | |
| 
 | |
| 1) Upgrade your entire ports collection and rebuild the port.
 | |
| 
 | |
| 2) Deinstall the old package and install a new package dated after the
 | |
| correction date, obtained from the following directories:
 | |
| 
 | |
| [i386]
 | |
| ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/www/mod_auth_pgsql-0.9.9.tgz
 | |
| ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/www/mod_auth_pgsql-0.9.9.tgz
 | |
| 
 | |
| [alpha]
 | |
| Packages are not automatically generated for the alpha architecture at
 | |
| this time due to lack of build resources.
 | |
| 
 | |
| 3) Download a new port skeleton for the mod_auth_pgsql port from:
 | |
| 
 | |
| http://www.freebsd.org/ports/
 | |
| 
 | |
| and use it to rebuild the port.
 | |
| 
 | |
| 4) Use the portcheckout utility to automate option (3) above. The
 | |
| portcheckout port is available in /usr/ports/devel/portcheckout or the
 | |
| package can be obtained from:
 | |
| 
 | |
| ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-4-stable/devel/portcheckout-2.0.tgz
 | |
| ftp://ftp.FreeBSD.org/pub/FreeBSD/ports/i386/packages-5-current/devel/portcheckout-2.0.tgz
 | |
| 
 | |
| VI.  Correction details
 | |
| 
 | |
| The following list contains the $FreeBSD$ revision numbers of each
 | |
| file that was corrected in the FreeBSD source
 | |
| 
 | |
| Path                                                             Revision
 | |
| - -------------------------------------------------------------------------
 | |
| ports/www/mod_auth_pgsql/Makefile                                     1.3
 | |
| ports/www/mod_auth_pgsql/distinfo                                     1.2
 | |
| - -------------------------------------------------------------------------
 | |
| 
 | |
| VII. References
 | |
| 
 | |
| <URL:http://cert.uni-stuttgart.de/advisories/apache_auth.php>
 | |
| -----BEGIN PGP SIGNATURE-----
 | |
| Version: GnuPG v1.0.6 (FreeBSD)
 | |
| Comment: For info see http://www.gnupg.org
 | |
| 
 | |
| iQCVAwUBPDZOBVUuHi5z0oilAQHfNgQAgp9FKI4P0XfSzBdbcdOnqPCBJji4TPLS
 | |
| gENpCcvT55dWcGjYr0XsJrsk1NhF3Qq0TR8CnN2OmWaxx1ugoqwdc6o0vqzYIQ5H
 | |
| DAwBK4tbYOBYmram7A+0VBbTxPlHTnTop56i3/w2xaxafMHdlrzB2zCO7pimU83i
 | |
| 2MAKa0dLwS4=
 | |
| =l5iu
 | |
| -----END PGP SIGNATURE-----
 |