USN-328-1: Apache vulnerability

Ubuntu Security Notice USN-328-1

28th July, 2006

apache2 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 6.06 LTS
  • Ubuntu 5.10
  • Ubuntu 5.04

Details

Mark Dowd discovered an off-by-one buffer overflow in the mod_rewrite
module's ldap scheme handling. On systems which activate
"RewriteEngine on", a remote attacker could exploit certain rewrite
rules to crash Apache, or potentially even execute arbitrary code
(this has not been verified).

"RewriteEngine on" is disabled by default. Systems which have this
directive disabled are not affected at all.

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 6.06 LTS:
apache2-mpm-worker 2.0.55-4ubuntu2.1
apache2-mpm-perchild 2.0.55-4ubuntu2.1
apache2-mpm-prefork 2.0.55-4ubuntu2.1
Ubuntu 5.10:
apache2-mpm-worker 2.0.54-5ubuntu4.1
apache2-mpm-perchild 2.0.54-5ubuntu4.1
apache2-mpm-prefork 2.0.54-5ubuntu4.1
apache2-mpm-threadpool 2.0.54-5ubuntu4.1
Ubuntu 5.04:
apache2-mpm-worker 2.0.53-5ubuntu5.6
apache2-mpm-perchild 2.0.53-5ubuntu5.6
apache2-mpm-prefork 2.0.53-5ubuntu5.6
apache2-mpm-threadpool 2.0.53-5ubuntu5.6

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system upgrade is sufficient to effect the
necessary changes.

References

CVE-2006-3747