httpd-2.2.3-31.2.1AXS3
エラータID: AXSA:2009-424:03
リリース日:
2009/12/01 Tuesday - 19:30
題名:
httpd-2.2.3-31.2.1AXS3
影響のあるチャネル:
Asianux Server 3 for x86_64
Asianux Server 3 for x86
Severity:
High
Description:
以下項目について対処しました。
[Security Fix]
- mod_proxy_ftp モジュールの ap_proxy_ftp_handler 関数には EPSV コマンドへの不正な応答によって、リモートの FTP サーバがサービス拒否 (ヌルポインタ参照と子プロセスのクラッシュ) を引き起こす脆弱性があります。(CVE-2009-3094)
- mod_proxy_ftp モジュールには認証 HTTP ヘッダにコマンドを埋め込むことによってリモートの攻撃者がアクセス制限を回避し、FTP サーバに任意のコマンドを送ることが可能な脆弱性があります。(CVE-2009-3095)
- TLS プロトコルと SSL プロトコルには既存の接続とのハンドシェイク再ネゴシエーショ
ンを適切に行わない問題があり、サーバによって再ネゴシエーション後に遡って処理される未認証のリクエストを送ることにより、攻撃者が HTTPS セッションや TLS によって保護されたセッション、あるいは SSL によって保護された他のタイプのセッションにデータを挿入し、中間者攻撃を行う可能性のある脆弱性があります。(CVE-2009-3555)
一部CVEの翻訳文はJVNからの引用になります。
http://jvndb.jvn.jp/
解決策:
パッケージをアップデートしてください。
CVE:
CVE-2009-3094
The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
CVE-2009-3095
The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.
The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.
CVE-2009-3555
The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
追加情報:
N/A
ダウンロード:
SRPMS
- httpd-2.2.3-31.2.1AXS3.src.rpm
MD5: 62f8cef4d20e6795a9a263cd9e036b18
SHA-256: 7c7524345ce180e1f042de482229cd7495a5bb83096b7512ec4c67cefee387bf
Size: 6.19 MB
Asianux Server 3 for x86
- httpd-2.2.3-31.2.1AXS3.i386.rpm
MD5: eecc91a5ea89b4fdf10d887047e986ef
SHA-256: 84dc455958e791252a3cfb9f51cc679957c02ea26d9712559a8e07929e4bc786
Size: 1.09 MB - httpd-devel-2.2.3-31.2.1AXS3.i386.rpm
MD5: e8caf9779bf8348def84d3530999b357
SHA-256: f8b85b3d503238afe484c471e91b7fba3679c6378d347e623d869176eb9a0d56
Size: 148.49 kB - httpd-manual-2.2.3-31.2.1AXS3.i386.rpm
MD5: 5f531e2fb3b388aad45323667349b693
SHA-256: 5242333be873b166b19d2da35f027c2489f587d66a0e720ccab19e46d0f77ac7
Size: 821.11 kB - mod_ssl-2.2.3-31.2.1AXS3.i386.rpm
MD5: 7ef43810ec344d6f0ea40e335ef142fd
SHA-256: e7853a083f014c6462d38ff92778f14ffd558485029961aff77eb8998490fa7a
Size: 89.02 kB
Asianux Server 3 for x86_64
- httpd-2.2.3-31.2.1AXS3.x86_64.rpm
MD5: 64772138356784680fcae9c77929defb
SHA-256: 2582817e27bd46a969d766ca71b650a9eb6ab8b04ffa84181e34792320a00c95
Size: 1.10 MB - httpd-devel-2.2.3-31.2.1AXS3.x86_64.rpm
MD5: 8227516ffa24cfef4c69bf514556d73e
SHA-256: 4652ee53afa60d97de08d1a2478f475cb1751a61252c267408b618b54b9ae4ba
Size: 148.41 kB - httpd-manual-2.2.3-31.2.1AXS3.x86_64.rpm
MD5: 8056562f9a6ad5a9185851a3577d8854
SHA-256: 6963f08cdbc72f260a6f7b01d08ed762a1cecb70769f66869d8b48d35fbb1194
Size: 820.97 kB - mod_ssl-2.2.3-31.2.1AXS3.x86_64.rpm
MD5: 077beb816fc2a4b485ae1c045b96549e
SHA-256: c05bf40026d9700f25e410e6826ec0a5eab6020b90139ea7ac97f16a68ea705e
Size: 89.84 kB