Description: | Summary: The remote host is missing an update for the 'mod_ssl' package(s) announced via the SSA:2004-154-01 advisory.
Vulnerability Insight: New mod_ssl packages are available for Slackware 8.1, 9.0, 9.1, and -current to fix a security issue. The packages were upgraded to mod_ssl-2.8.18-1.3.31 fixing a buffer overflow that may allow remote attackers to execute arbitrary code via a client certificate with a long subject DN, if mod_ssl is configured to trust the issuing CA. Web sites running mod_ssl should upgrade to the new set of apache and mod_ssl packages. There are new PHP packages as well to fix a Slackware-specific local denial-of-service issue (an additional Slackware advisory SSA:2004-154-02 has been issued for PHP).
More details about the mod_ssl issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
[link moved to references]
Here are the details from the Slackware 9.1 ChangeLog: +--------------------------+ Wed Jun 2 11:28:17 PDT 2004 patches/packages/mod_ssl-2.8.18_1.3.31-i486-1.tgz: Upgraded to mod_ssl-2.8.18-1.3.31. This fixes a buffer overflow that may allow remote attackers to execute arbitrary code via a client certificate with a long subject DN, if mod_ssl is configured to trust the issuing CA: *) Fix buffer overflow in 'SSLOptions +FakeBasicAuth' implementation if the Subject-DN in the client certificate exceeds 6KB in length. For more details, see: [link moved to references] (* Security fix *) Other changes: Make the sample keys .new so as not to overwrite existing server keys. However, any existing mod_ssl package will have these listed as non-config files, and will still remove and replace these upon upgrade. You'll have to save your config files one more time... sorry). +--------------------------+
Affected Software/OS: 'mod_ssl' package(s) on Slackware 8.1, Slackware 9.0, Slackware 9.1, Slackware current.
Solution: Please install the updated package(s).
CVSS Score: 7.5
CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
|