Security update for Apache and mod_ssl
Knowledgebase
(Last modified: 30JUL2002)
solutions Security update for Apache and mod_ssl SuSE Linux Maintenance Web (027e762bfb256384aaad29ed94b3ab83)
SuSE Linux Enterprise Server 7 for IBM zSeries
SuSE Linux Enterprise Server 7 for PowerPC
SuSE Linux Enterprise Server 7 for IA32
SuSE Linux Enterprise Server 7 for IA64
SuSE Linux Enterprise Server 7 for S/390 and zSeries
SuSE eMail Server 3.1
SuSE Linux Office Server
SuSE Linux Connectivity Server
Package: apache
mod_ssl
Release: 20020730
Obsoletes: none
update.
In addition to these improvements, a security problem with mod_ssl has been fixed. When parsing ssl-specific options in
.htaccess
files, mod_ssl
can overflow a buffer with a single byte. A local attacker may exploit this vulnerability to cause the apache webserver child instance to crash, resulting in a restart of another instance triggered by the main daemon. This would cause a minor resource overhead on the machine running the apache webserver. Please note that this vulnerability is only present if your apache webserver is configured to provide ssl enabled http service, and if directives given in apache's main configuration file can be overridden by directives in .htaccess
files (which is disrecommended in general). It is yet unclear if this vulnerability can be exploited to gain unauthorized access to the webserver (by a local attacker).
rpm --nodeps -Uvh apache.rpm mod_ssl.rpm
After performing the update of the RPM packages, please restart the apache webserver using the command
rcapache restart
for the update packages to take effect.
Download Source Packages
Download the source code of the patches for maintained products.
Disclaimer
The Origin of this information may be internal or external to Novell. Novell makes all reasonable efforts to verify this information. However, the information provided in this document is for your information only. Novell makes no explicit or implied claims to the validity of this information.
Any trademarks referenced in this document are the property of their respective owners. Consult your product manuals for complete trademark information.