blob: 171f078a0ffcfc48190087f2f3e731295aa1e603 [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200608-01">
<title>Apache: Off-by-one flaw in mod_rewrite</title>
A flaw in mod_rewrite could result in a Denial of Service or the execution
of arbitrary code.
<product type="ebuild">apache</product>
<announced>August 01, 2006</announced>
<revised>December 30, 2007: 02</revised>
<package name="www-servers/apache" auto="yes" arch="*">
<unaffected range="rge">1.3.34-r14</unaffected>
<unaffected range="rge">1.3.37</unaffected>
<unaffected range="ge">2.0.58-r2</unaffected>
<vulnerable range="lt">2.0.58-r2</vulnerable>
The Apache HTTP server is one of the most popular web servers on the
Internet. The Apache module mod_rewrite provides a rule-based engine to
rewrite requested URLs on the fly.
An off-by-one flaw has been found in Apache's mod_rewrite module by
Mark Dowd of McAfee Avert Labs. This flaw is exploitable depending on
the types of rewrite rules being used.
<impact type="high">
A remote attacker could exploit the flaw to cause a Denial of Service
or execution of arbitrary code. Note that Gentoo Linux is not
vulnerable in the default configuration.
There is no known workaround at this time.
All Apache users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose www-servers/apache</code>
<uri link="">CVE-2006-3747</uri>
<uri link="">Apache HTTP Server 2.0 Announcement</uri>
<uri link="">Apache HTTP Server 1.3 Announcement</uri>
<metadata tag="requester" timestamp="Fri, 28 Jul 2006 11:10:33 +0000">
<metadata tag="submitter" timestamp="Fri, 28 Jul 2006 12:10:22 +0000">
<metadata tag="bugReady" timestamp="Sat, 29 Jul 2006 21:48:21 +0000">