Bug 618189 (CVE-2010-1452)

Summary: CVE-2010-1452 httpd mod_cache, mod_dav: DoS (httpd child process crash) by parsing URI structure with missing path segments
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: bressers, jorton, jshepherd, mjc, mmillson, pahan, pcheung, phil4v7, tao, vdanen
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-04-10 19:10:18 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 618192, 618193, 623210, 623211, 663967, 663968    
Bug Blocks:    

Description Jan Lieskovsky 2010-07-26 11:32:32 UTC
Apache Software Foundation assigned an identifier CVE-2010-1452 to
the following vulnerability:

A flaw was found in the handling of requests by mod_cache and mod_dav.
A malicious remote attacker could send a carefully crafted request and
cause a httpd child process to crash. This crash would only be a denial
of service if using the worker MPM. This issue is further mitigated as
mod_dav is only affected by requests that are most likely to be
authenticated, and mod_cache is only affected if the uncommon 
CacheIgnoreURLSessionIdentifiers" directive, introduced in version 2.2.14,
is used.

References:
  [1] http://httpd.apache.org/security/vulnerabilities_22.html

Upstream bug report:
  [2] https://issues.apache.org/bugzilla/show_bug.cgi?id=49246

Upstream patch:
  [3] http://svn.apache.org/viewvc?view=revision&revision=966349

Credit: Mark Drayton

More reproducer details from [2]:
(https://issues.apache.org/bugzilla/show_bug.cgi?id=49246#c0)

When configured with a virtual host, caching and a non-empty
CacheIgnoreURLSessionIdentifiers parameter httpd segfaults on requests with no
path. Configuration:

NameVirtualHost *:80
<VirtualHost *:80>
  ServerName www.example.com
  CacheEnable disk /
  CacheRoot /tmp/cache-root
  CacheDefaultExpire 86400
  CacheIgnoreURLSessionIdentifiers cachebuster
</VirtualHost>

Test:

host:~ tail -0f logs/error_log &
[1] 7637
host:~ (echo "GET http://www.example.com HTTP/1.0"; echo) | nc localhost 80
[Tue May 04 14:12:47 2010] [notice] child pid 7617 exit signal Segmentation
fault (11)

Comment 1 Jan Lieskovsky 2010-07-26 11:38:57 UTC
This issue did NOT affect the versions of the httpd package, as shipped
with Red Hat Enterprise Linux 3 and 4.

This issue affects the version of the httpd package, as shipped with
Red Hat Enterprise Linux 5.

This issue affects the version of the httpd package, as shipped with
JBoss Enterprise Web Server 1.0.1 for Red Hat Enterprise Linux 4 and 5.

This issue affects the versions of the httpd package, as shipped with
Fedora release of 12 and 13.

Comment 2 Jan Lieskovsky 2010-07-26 11:43:30 UTC
Created httpd tracking bugs for this issue

Affects: fedora-all [bug 618192]

Comment 4 Jan Lieskovsky 2010-07-26 11:45:18 UTC
Statement:

(none)

Comment 6 errata-xmlrpc 2010-08-30 12:30:48 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2010:0659 https://rhn.redhat.com/errata/RHSA-2010-0659.html

Comment 7 Mike Millson 2010-10-22 12:59:28 UTC
The fix for this will be driven by this Jira:
https://jira.jboss.org/browse/JBPAPP-4884

Comment 8 Tomas Hoger 2010-11-24 11:50:52 UTC
(In reply to comment #1)
> This issue did NOT affect the versions of the httpd package, as shipped
> with Red Hat Enterprise Linux 3 and 4.

mod_dav issue affected httpd 2.0.x versions too and hence affect httpd packages in Red Hat Enterprise Linux 3 and 4 too.  Issue was fixed upstream in the following 2.0.x branch commit:

http://svn.apache.org/viewvc?view=revision&revision=1005655

included in upstream version 2.0.64:

http://httpd.apache.org/security/vulnerabilities_20.html#2.0.64

Comment 11 errata-xmlrpc 2011-06-22 23:17:15 UTC
This issue has been addressed in following products:

  JBoss Enterprise Web Server 1.0

Via RHSA-2011:0896 https://rhn.redhat.com/errata/RHSA-2011-0896.html

Comment 12 errata-xmlrpc 2011-06-22 23:38:56 UTC
This issue has been addressed in following products:

  JBEWS 1.0 for RHEL 5
  JBEWS 1.0 for RHEL 4
  JBEWS 1 for RHEL 6

Via RHSA-2011:0897 https://rhn.redhat.com/errata/RHSA-2011-0897.html