Security update for Apache and mod_ssl
(Last modified: 30JUL2002)
solutions Security update for Apache and mod_ssl SuSE Linux Maintenance Web (027e762bfb256384aaad29ed94b3ab83)
SuSE Linux Enterprise Server 7 for IBM zSeries
SuSE Linux Enterprise Server 7 for PowerPC
SuSE Linux Enterprise Server 7 for IA32
SuSE Linux Enterprise Server 7 for IA64
SuSE Linux Enterprise Server 7 for S/390 and zSeries
SuSE eMail Server 3.1
SuSE Linux Office Server
SuSE Linux Connectivity Server
In addition to these improvements, a security problem with mod_ssl has been fixed. When parsing ssl-specific options in
mod_sslcan overflow a buffer with a single byte. A local attacker may exploit this vulnerability to cause the apache webserver child instance to crash, resulting in a restart of another instance triggered by the main daemon. This would cause a minor resource overhead on the machine running the apache webserver. Please note that this vulnerability is only present if your apache webserver is configured to provide ssl enabled http service, and if directives given in apache's main configuration file can be overridden by directives in
.htaccessfiles (which is disrecommended in general).
It is yet unclear if this vulnerability can be exploited to gain unauthorized access to the webserver (by a local attacker).
rpm --nodeps -Uvh apache.rpm mod_ssl.rpm
After performing the update of the RPM packages, please restart the apache webserver using the command
for the update packages to take effect.
Download Source Packages
Download the source code of the patches for maintained products.
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.