USN-328-1: Apache vulnerability

28 July 2006

apache2 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 6.06 LTS
  • Ubuntu 5.10
  • Ubuntu 5.04

Software Description

Details

Mark Dowd discovered an off-by-one buffer overflow in the mod_rewrite module’s ldap scheme handling. On systems which activate “RewriteEngine on”, a remote attacker could exploit certain rewrite rules to crash Apache, or potentially even execute arbitrary code (this has not been verified).

“RewriteEngine on” is disabled by default. Systems which have this directive disabled are not affected at all.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 6.06 LTS
apache2-mpm-perchild - 2.0.55-4ubuntu2.1
apache2-mpm-prefork - 2.0.55-4ubuntu2.1
apache2-mpm-worker - 2.0.55-4ubuntu2.1
Ubuntu 5.10
apache2-mpm-perchild - 2.0.54-5ubuntu4.1
apache2-mpm-prefork - 2.0.54-5ubuntu4.1
apache2-mpm-threadpool - 2.0.54-5ubuntu4.1
apache2-mpm-worker - 2.0.54-5ubuntu4.1
Ubuntu 5.04
apache2-mpm-perchild - 2.0.53-5ubuntu5.6
apache2-mpm-prefork - 2.0.53-5ubuntu5.6
apache2-mpm-threadpool - 2.0.53-5ubuntu5.6
apache2-mpm-worker - 2.0.53-5ubuntu5.6

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system upgrade is sufficient to effect the necessary changes.

References