Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 04 Oct 2002 00:15:16 -0400
From:      Mike Tancsa <mike@sentex.net>
To:        freebsd-security@freebsd.org
Subject:   Fwd: iDEFENSE Security Advisory 10.03.2002: Apache 1.3.x shared memory scoreboard vulnerabilities
Message-ID:  <5.1.1.6.0.20021004001325.0397c618@marble.sentex.ca>

next in thread | raw e-mail | index | archive | help

FYI for those of you not on bugtraq.

         ---Mike


>Mailing-List: contact bugtraq-help@securityfocus.com; run by ezmlm
>List-Id: <bugtraq.list-id.securityfocus.com>
>List-Post: <mailto:bugtraq@securityfocus.com>
>List-Help: <mailto:bugtraq-help@securityfocus.com>
>List-Unsubscribe: <mailto:bugtraq-unsubscribe@securityfocus.com>
>List-Subscribe: <mailto:bugtraq-subscribe@securityfocus.com>
>Delivered-To: mailing list bugtraq@securityfocus.com
>Delivered-To: moderator for bugtraq@securityfocus.com
>From: "David Endler" <dendler@idefense.com>
>To: bugtraq@securityfocus.com
>Date: Thu, 3 Oct 2002 12:47:54 -0400
>Subject: iDEFENSE Security Advisory 10.03.2002: Apache 1.3.x shared memory=
=20
>scoreboard vulnerabilities
>Reply-To: dendler@idefense.com
>X-Spam-Status: No, hits=3D-5.1 required=3D5.0 tests=3DPGP_SIGNATURE=
 version=3D2.11
>X-Virus-Scanned: By Sentex Communications (avscan1/20020517)
>
>-----BEGIN PGP SIGNED MESSAGE-----
>Hash: SHA1
>
>iDEFENSE Security Advisory 10.03.2002
>Apache 1.3.x shared memory scoreboard vulnerabilities
>
>16:00 GMT, October 3, 2002
>
>
>I. BACKGROUND
>
>The Apache Software Foundation's HTTP Server is an effort to develop
>and maintain an open-source HTTP server for modern operating systems
>including Unix and Windows NT. The goal of this project is to provide
>a secure, efficient and extensible server that provides HTTP services
>in sync with the current HTTP standards.  More details about it are
>available at http://httpd.apache.org .
>
>II. DESCRIPTION
>
>Apache HTTP Server contains a vulnerability in its shared memory
>scoreboard. Attackers who can execute commands under the Apache UID
>can either send a (SIGUSR1) signal to any process as root, in most
>cases killing the process, or launch a local denial of service (DoS)
>attack.
>
>III. ANALYSIS
>
>Exploitation requires execute permission under the Apache UID. This
>can be obtained by any local user with a legitimate Apache scripting
>resource (ie: PHP, Perl), exploiting a vulnerability in web-based
>applications written in the above example languages, or through the
>use of some other local/remote Apache exploit.
>
>Once such a status is attained, the attacker can then attach to the
>httpd daemon's 'scoreboard', which is stored in a shared memory
>segment owned by Apache. The attacker can then cause a DoS condition
>on the system by continuously filling the table with null values and
>causing the server to spawn new children.
>
>The attacker also has the ability to send any process a SIGUSR1
>signal as root. This is accomplished by continuously overwriting the
>parent[].pid and parent[].last_rtime segments within the scoreboard
>to the pid of the target process and a time in the past. When the
>target pid receives the signal SIGUSR1, it will react according to
>how it is designed to manage the signal. According to the man page
>(man 7 signal), if the signal is un-handled then the default action
>is to terminate:
>
>      ...
>      SIGUSR1 30,10,16 A User-defined signal 1
>      ...
>      The letters in the "Action" column have the following meanings:
>
>      A Default action is to terminate the process.
>      ...
>
>iDEFENSE successfully terminated arbitrary processes, including those
>that "kicked" people off the system.
>
>IV. DETECTION
>
>Apache HTTP Server 1.3.x, running on all applicable Unix platforms,
>is affected.
>
>V. VENDOR FIX/RESPONSE
>
>Apache HTTP Server 1.3.27 fixes this problem. It should be available
>on October 3 at http://www.apache.org/dist/httpd/ .
>
>VI. CVE INFORMATION
>
>The Mitre Corp.'s Common Vulnerabilities and Exposures (CVE) Project
>has assigned the identification number CAN-2002-0839 to this issue.
>
>VII. DISCLOSURE TIMELINE
>
>8/27/2002       Issue disclosed to iDEFENSE
>9/18/2002       Vendor notified at security@apache.org
>9/18/2002       iDEFENSE clients notified
>9/19/2002       Response received from Mark J Cox (mark@awe.com)
>10/3/2002       Coordinated public disclosure
>
>VIII. CREDIT
>
>zen-parse (zen-parse@gmx.net) disclosed this issue to iDEFENSE.
>
>
>Get paid for security research
>http://www.idefense.com/contributor.html
>
>Subscribe to iDEFENSE Advisories:
>send email to listserv@idefense.com, subject line: "subscribe"
>
>
>About iDEFENSE:
>
>iDEFENSE is a global security intelligence company that proactively
>monitors sources throughout the world =97 from technical
>vulnerabilities and hacker profiling to the global spread of viruses
>and other malicious code. iALERT, our security intelligence service,
>provides decision-makers, frontline security professionals and
>network administrators with timely access to actionable intelligence
>and decision support on cyber-related threats. For more information,
>visit http://www.idefense.com.
>
>
>- -dave
>
>David Endler, CISSP
>Director, Technical Intelligence
>iDEFENSE, Inc.
>14151 Newbrook Drive
>Suite 100
>Chantilly, VA 20151
>voice: 703-344-2632
>fax: 703-961-1071
>
>dendler@idefense.com
>www.idefense.com
>
>-----BEGIN PGP SIGNATURE-----
>Version: PGP 7.1.2
>Comment: http://pgp.mit.edu:11371/pks/lookup?op=3Dget&search=3D0x4B0ACC2A
>
>iQA/AwUBPZx0I0rdNYRLCswqEQIowQCfQT+FYR1FLTEzlf49SpJXwDnie8wAn3Kr
>CncduGV6EYHqVayQE90b7Yij
>=3D4T8j
>-----END PGP SIGNATURE-----

--------------------------------------------------------------------
Mike Tancsa,                          	          tel +1 519 651 3400
Sentex Communications,     			  mike@sentex.net
Providing Internet since 1994                    www.sentex.net
Cambridge, Ontario Canada			  www.sentex.net/mike


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5.1.1.6.0.20021004001325.0397c618>