SOURCES: apache-CVE-2005-3352.patch (NEW) - Cross-site scripting (...

glen glen at pld-linux.org
Tue Feb 7 20:35:47 CET 2006


Author: glen                         Date: Tue Feb  7 19:35:47 2006 GMT
Module: SOURCES                       Tag: HEAD
---- Log message:
- Cross-site scripting (XSS) vulnerability in the mod_imap module of Apache httpd

---- Files affected:
SOURCES:
   apache-CVE-2005-3352.patch (NONE -> 1.1)  (NEW)

---- Diffs:

================================================================
Index: SOURCES/apache-CVE-2005-3352.patch
diff -u /dev/null SOURCES/apache-CVE-2005-3352.patch:1.1
--- /dev/null	Tue Feb  7 20:35:47 2006
+++ SOURCES/apache-CVE-2005-3352.patch	Tue Feb  7 20:35:42 2006
@@ -0,0 +1,35 @@
+http://bugs.gentoo.org/show_bug.cgi?id=118875
+
+--- server/util.c	(revision 330526)
++++ server/util.c	(working copy)
+@@ -1762,6 +1762,8 @@
+             j += 3;
+         else if (s[i] == '&')
+             j += 4;
++        else if (s[i] == '"')
++            j += 5;
+ 
+     if (j == 0)
+         return apr_pstrmemdup(p, s, i);
+@@ -1780,6 +1782,10 @@
+             memcpy(&x[j], "&", 5);
+             j += 4;
+         }
++        else if (s[i] == '"') {
++            memcpy(&x[j], """, 6);
++            j += 5;
++        }
+         else
+             x[j] = s[i];
+ 
+--- modules/mappers/mod_imap.c	(revision 330526)
++++ modules/mappers/mod_imap.c	(working copy)
+@@ -342,7 +342,7 @@
+     if (!strcasecmp(value, "referer")) {
+         referer = apr_table_get(r->headers_in, "Referer");
+         if (referer && *referer) {
+-	    return apr_pstrdup(r->pool, referer);
++	    return ap_escape_html(r->pool, referer);
+         }
+         else {
+ 	    /* XXX:  This used to do *value = '\0'; ... which is totally bogus
================================================================


More information about the pld-cvs-commit mailing list