mod_ssl 2.8.18-1.3.31: Security Fix

Arkadiusz Patyk areq w pld-linux.org
Pią, 28 Maj 2004, 09:40:06 CEST


Witam

Wykryto buga w mod_ssl < 2.8.18-1.3.31.

Vulnerability:       arbitrary code execution  
Description:                                                                                        
  Georgi Guninski discovered [1] a stack-based buffer overflow in                                   
  the "SSLOptions +FakeBasicAuth" implementation of Apache's SSL/TLS                                
  extension module mod_ssl [0]. The overflow can occur if the Subject-DN                            
  in the client certificate exceeds 6KB in length and mod_ssl is
  configured to trust the issuing CA. The Common Vulnerabilities and                                
  Exposures (CVE) project assigned the id CAN-2004-0488 [2] to the                                  
  problem.                                                                                         

Zaktualizowałem na HEAD i RA-branch. Proszę o puszczenie na buildery
i umieszenia na ftp ASAP. 
                                                                                
-- 
Arkadiusz Patyk [areq(at)pld-linux.org] [http://rescuecd.pld-linux.org]
[IRC:areq ICQ:16231667  GG:1383]  [AP3-6BONE] [AP14126-RIPE]



Więcej informacji o liście dyskusyjnej pld-devel-pl