Bug 1077867 (CVE-2013-6438)
Summary: | CVE-2013-6438 httpd: mod_dav denial of service via crafted DAV WRITE request | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vincent Danen <vdanen> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aneelica, anil.saldhana, bdunne, cdewolf, chazlett, chuffman, dajohnso, ddu, drieden, fholec, fnasser, huwang, jawilson, jdoyle, jfrey, jkaluza, jkurik, jorton, jrafanie, jrusnack, kseifried, lgao, mmaslano, mmcgrath, mtessun, myarboro, nobody+bgollahe, obarenbo, pahan, pcheung, pfrields, pgier, pslavice, rmeggins, rsvoboda, tis, vtunka, webstack-team, weli, xlecauch |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | httpd 2.4.9 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2014-09-17 07:57:58 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1077878, 1077885, 1077907, 1078174, 1078175, 1078176, 1078177, 1078686, 1078687, 1078688, 1078689, 1127227 | ||
Bug Blocks: | 1077876, 1078645, 1093890, 1105541, 1112035 |
Description
Vincent Danen
2014-03-18 18:11:08 UTC
Created httpd tracking bugs for this issue: Affects: fedora-all [bug 1077878] Upstream has described this issue as follows, which is a bit different from MITRE's description: XML parsing code in mod_dav incorrectly calculates the end of the string when removing leading spaces and places a NUL character outside the buffer, causing random crashes. This XML parsing code is only used with DAV provider modules that support DeltaV, of which the only publicly released provider is mod_dav_svn. Detailed writeup from the original reporter at: http://www.drcruft.com/2014/03/apache-moddav-vulnerability-cve-2013.html This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2014:0369 https://rhn.redhat.com/errata/RHSA-2014-0369.html This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2014:0370 https://rhn.redhat.com/errata/RHSA-2014-0370.html This flaw is in the dav_xml_get_cdata() function. In httpd itself, the function is called from handlers for CHECKOUT and MERGE methods, which are part of mod_dav. However, those handlers can only call those methods when used with versioning DAV "provider" (the one that sets vsn hooks in dav_provider structure). The httpd includes one DAV provider - DAV filesystem provider - implemented in module mod_dav_fs. This provider does not implement versioning hooks and hence can not expose this issue. The only other DAV provider shipped as part of Red Hat Enterprise Linux is mod_dav_svn that is part of subversion. That is versioning provider and hence exposes issue in mod_dav's CHECKOUT and MERGE handlers. It itself also calls the affected dav_xml_get_cdata() function directly. Configurations using mod_dav_svn are known to be affected. Configurations only using mod_dav_fs are not affected. One way to ensure DAV functionality is not used and can not expose this issue is to avoid loading all dav modules by commenting all relevant LoadModule directives in httpd configuration. httpd-2.4.9-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in following products: JBoss Enterprise Web Server 2.0.1 Via RHSA-2014:0784 https://rhn.redhat.com/errata/RHSA-2014-0784.html This issue has been addressed in following products: JBEWS 2 for RHEL 5 JBEWS 2 for RHEL 6 Via RHSA-2014:0783 https://rhn.redhat.com/errata/RHSA-2014-0783.html This issue has been addressed in following products: JBEAP 6.2 for RHEL 5 JBEAP 6.2 for RHEL 6 Via RHSA-2014:0826 https://rhn.redhat.com/errata/RHSA-2014-0826.html This issue has been addressed in following products: Red Hat JBoss Enterprise Application Platform 6.2 Via RHSA-2014:0825 https://rhn.redhat.com/errata/RHSA-2014-0825.html |