Bug 983549 (CVE-2013-1896)

Summary: CVE-2013-1896 httpd: mod_dav DoS (httpd child process crash) via a URI MERGE request with source URI not handled by mod_dav
Product: [Other] Security Response Reporter: Jan Lieskovsky <jlieskov>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: jason.greene, jdoyle, jkaluza, jkurik, jorton, lgao, pahan, pcheung, pslavice, rmeggins, rsvoboda, webstack-team, weli
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-09-04 19:22:31 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 983617, 983618, 987212, 987213, 991366, 991367, 991368, 991369, 1014388    
Bug Blocks: 980700, 983624, 987712    

Description Jan Lieskovsky 2013-07-11 12:44:31 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2013-1896 to the following vulnerability:

mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.

References:
http://www.apache.org/dist/httpd/Announcement2.2.html
http://svn.apache.org/viewvc?view=revision&revision=1485668

Comment 2 Jan Lieskovsky 2013-07-11 14:39:43 UTC
This issue affects the versions of the httpd package, as shipped with Red Hat Enterprise Linux 4, 5, and 6.

--

This issue affects the versions of the httpd package, as shipped with Fedora release of 17, 18, and 19. Please schedule an update.

Comment 5 Jan Lieskovsky 2013-07-11 14:42:23 UTC
Created httpd tracking bugs for this issue:

Affects: fedora-all [bug 983618]

Comment 7 Jan Lieskovsky 2013-07-11 14:55:41 UTC
Upstream patch against v.2.4.x branch:
  http://svn.apache.org/viewvc?view=revision&revision=1486461

Comment 13 errata-xmlrpc 2013-08-05 15:31:34 UTC
This issue has been addressed in following products:

  JBEWS 2 for RHEL 5
  JBEWS 2 for RHEL 6

Via RHSA-2013:1133 https://rhn.redhat.com/errata/RHSA-2013-1133.html

Comment 14 errata-xmlrpc 2013-08-05 15:42:02 UTC
This issue has been addressed in following products:

  JBEWS 2 for RHEL 5
  JBEWS 2 for RHEL 6
  JBEWS 2 for Solaris
  JBEWS 2 for Microsoft Windows

Via RHSA-2013:1134 https://rhn.redhat.com/errata/RHSA-2013-1134.html

Comment 15 Fedora Update System 2013-08-09 17:10:50 UTC
httpd-2.4.6-2.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 16 errata-xmlrpc 2013-08-13 16:27:54 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6

Via RHSA-2013:1156 https://rhn.redhat.com/errata/RHSA-2013-1156.html

Comment 17 Fedora Update System 2013-08-16 23:03:13 UTC
httpd-2.4.6-2.fc18 has been pushed to the Fedora 18 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 18 errata-xmlrpc 2013-09-04 18:56:39 UTC
This issue has been addressed in following products:

  Red Hat JBoss Enterprise Application Platform 6.1.1

Via RHSA-2013:1209 https://rhn.redhat.com/errata/RHSA-2013-1209.html

Comment 19 errata-xmlrpc 2013-09-04 18:58:37 UTC
This issue has been addressed in following products:

  JBEAP 6 for RHEL 6

Via RHSA-2013:1208 https://rhn.redhat.com/errata/RHSA-2013-1208.html

Comment 20 errata-xmlrpc 2013-09-04 19:03:09 UTC
This issue has been addressed in following products:

  JBEAP 6 for RHEL 5

Via RHSA-2013:1207 https://rhn.redhat.com/errata/RHSA-2013-1207.html