Release date: 2011-11-02
Updated on: 2011-11-03
Affected Systems:
Apache Group Apache HTTP Server 2.2.x
Apache Group Apache HTTP Server 2.0.x
Description:
--------------------------------------------------------------------------------
Bugtraq id: 50494
Cve id: CVE-2011-3607
Apache HTTP Server is an open-source Web Server of the Apache Software Foundation. It can be run in most computer operating systems. It is widely used for cross-platform and security, is one of the most popular Web server software.
Apache HTTP Server has a local permission Escalation Vulnerability in the implementation of the "ap_pregsub ()" function. Local attackers can exploit this vulnerability to execute arbitrary code with elevated permissions.
To trigger this vulnerability, mod_setenvif must be enabled, and attackers can place malicious. htaccess files on the affected servers. This vulnerability is caused by an integer overflow error in the "ap_pregsub ()" function (server/utils. c). A special. htaccess file can cause a heap buffer overflow.
<* Source: halfdog
Link: http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Apache Group
------------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://httpd.apache.org/