Vulnerability Note VU#104555

Buffer Overflow in mod_ssl

Original Release date: 17 Apr 2003 | Last revised: 17 Jun 2003

Overview

A buffer overflow exists in mod_ssl.

Description

mod_ssl is an Apache module that allows secure connections over X.509 authenticated channels. A buffer overflow exists in the ssl_compat_directive() function. For more detailed information, please see the original vulnerability report.

Impact

A local attacker can execute arbitrary code with the privileges of the web server. Additionally, an attacker may be able to add bogus entries to multiple web server log files. An attacker may also be able to slow down or even stop the web server.

Solution

Apply a patch from your vendor.

Do not allow per-directory config files. To accomplish this, set the AllowOverride directive to "none" in the httpd.conf file. As a reminder, you must restart the web server for the changes to take effect.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
Apple Computer Inc.Affected-30 Apr 2003
ConectivaAffected-08 Jul 2002
DebianAffected-30 Apr 2003
EngardeAffected-17 Apr 2003
Hewlett-Packard CompanyAffected-17 Apr 2003
IBMAffected-17 Jun 2003
Red Hat Inc.Affected-30 Apr 2003
SCOAffected-17 Apr 2003
The mod_ssl projectAffected-08 Jul 2002
Extreme NetworksNot Affected-01 May 2003
Foundry Networks Inc.Not Affected-07 May 2003
HitachiNot Affected-08 May 2003
Ingrian NetworksNot Affected-02 May 2003
SGINot Affected-30 Apr 2003
Xerox CorporationNot Affected-30 May 2003
If you are a vendor and your product is affected, let us know.View More »

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

Credit

This vulnerability was discovered by Frank Denis.

This document was written by Ian A Finlay.

Other Information

  • CVE IDs: CVE-2002-0653
  • Date Public: 24 Jun 2002
  • Date First Published: 17 Apr 2003
  • Date Last Updated: 17 Jun 2003
  • Severity Metric: 23.62
  • Document Revision: 34

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.