-----BEGIN PGP SIGNED MESSAGE----- ============================================================================= FreeBSD-SA-96:02 Security Advisory FreeBSD, Inc. Topic: apache httpd meta-character escaping Category: port Module: apache Announced: 1996-04-22 Affects: FreeBSD 2.0.5 and 2.1.0 ports/packages distributions with apache http daemon installed an enabled Corrected: 1996-04-21 ports source code Source: Generic apache distribution bug FreeBSD only: no Reference: CERT Advisory CA-96.06.cgi_example_code (warning: CERT's advisory is incomplete) Patches: no patches available, see below for update ============================================================================= I. Background A bug was found in the apache daemon that may allow remote users to obtain unauthorized access to a machine running apache httpd. II. Problem Description Versions of the apache http daemon before release 1.05 do not properly restrict shell meta-characters transmitted to the daemon via form input (via GET or POST). III. Impact The problem could allow remote users to gain unauthorized access to a system. This problem is only exploitable on systems where the apache http daemon has been installed and is enabled. The apache http daemon is not installed or enabled by default but is a common package that many FreeBSD users may have chosen to install. IV. Solution(s) The Apache Group released version 1.05 of the daemon which fixes this vulnerability. The FreeBSD Project updated the ports and packages system to use this new daemon. Interested parties may obtain an updated pre-compiled FreeBSD package from: ftp://ftp.freebsd.org/pub/FreeBSD/packages-current/www/apache-1.0.5.tgz and an updated "automatic port" from the directory hierarchy: ftp://ftp.freebsd.org/pub/FreeBSD/ports-current/www/apache.tar.gz V. Workaround This vulnerability can only be eliminated by updating to a more recent version of apache or by disabling apache httpd. ============================================================================= FreeBSD, Inc. Web Site: http://www.freebsd.org/ Confidential contacts: security-officer@freebsd.org PGP Key: ftp://freebsd.org/pub/CERT/public_key.asc Security notifications: security-notifications@freebsd.org Security public discussion: security@freebsd.org Notice: Any patches in this document may not apply cleanly due to modifications caused by digital signature or mailer software. Please reference the URL listed at the top of this document for original copies of all patches if necessary. ============================================================================= -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCVAwUBMaLAi1UuHi5z0oilAQHqiQP/VKL3RhyNc3jmYyH6ydteiQUQ1+t7boqr 304LP9g3ifq/cdxDwjbR4joiVjTNsqvOE1LQryI0qHq6nFPqGBsnHZI+thYGNYdI rjKOMRPF2VbzFx0W7mdvnQLxfCcU8Ma3A0zlub5hhqvN2gg3RVTXNYnF2FHIFL77 cVdx+nVibo8= =tNpA -----END PGP SIGNATURE-----