Bug 1077867 - (CVE-2013-6438) CVE-2013-6438 httpd: mod_dav denial of service via crafted DAV WRITE request
CVE-2013-6438 httpd: mod_dav denial of service via crafted DAV WRITE request
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20131003,repor...
: Security
Depends On: 1127227 1077878 1077885 1077907 1078174 1078175 1078176 1078177 1078686 1078687 1078688 1078689
Blocks: 1077876 1078645 1093890 1105541 1112035
  Show dependency treegraph
 
Reported: 2014-03-18 14:11 EDT by Vincent Danen
Modified: 2015-10-15 14:17 EDT (History)
40 users (show)

See Also:
Fixed In Version: httpd 2.4.9
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2014-09-17 03:57:58 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)

  None (edit)
Description Vincent Danen 2014-03-18 14:11:08 EDT
Common Vulnerabilities and Exposures assigned an identifier CVE-2013-6438 to
the following vulnerability:

Name: CVE-2013-6438
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438
Assigned: 20131104
Reference: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/util.c
Reference: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/util.c?r1=1528718&r2=1556428&diff_format=h
Reference: http://www.apache.org/dist/httpd/CHANGES_2.4.9

The dav_xml_get_cdata function in main/util.c in the mod_dav module in
the Apache HTTP Server before 2.4.8 does not properly remove
whitespace characters from CDATA sections, which allows remote
attackers to cause a denial of service (daemon crash) via a crafted
DAV WRITE request.
Comment 1 Vincent Danen 2014-03-18 14:33:07 EDT
Created httpd tracking bugs for this issue:

Affects: fedora-all [bug 1077878]
Comment 3 Vincent Danen 2014-03-18 15:43:31 EDT
Upstream has described this issue as follows, which is a bit different from MITRE's description:

XML parsing code in mod_dav incorrectly calculates the end of the string when removing leading spaces and places a NUL character outside the buffer, causing random crashes. This XML parsing code is only used with DAV provider modules that support DeltaV, of which the only publicly released provider is mod_dav_svn.
Comment 9 Huzaifa S. Sidhpurwala 2014-03-20 06:30:01 EDT
Detailed writeup from the original reporter at:

http://www.drcruft.com/2014/03/apache-moddav-vulnerability-cve-2013.html
Comment 13 errata-xmlrpc 2014-04-03 17:00:46 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2014:0369 https://rhn.redhat.com/errata/RHSA-2014-0369.html
Comment 14 errata-xmlrpc 2014-04-03 17:01:17 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2014:0370 https://rhn.redhat.com/errata/RHSA-2014-0370.html
Comment 16 Tomas Hoger 2014-04-17 16:14:12 EDT
This flaw is in the dav_xml_get_cdata() function.  In httpd itself, the function is called from handlers for CHECKOUT and MERGE methods, which are part of mod_dav.  However, those handlers can only call those methods when used with versioning DAV "provider" (the one that sets vsn hooks in dav_provider structure).

The httpd includes one DAV provider - DAV filesystem provider - implemented in module mod_dav_fs.  This provider does not implement versioning hooks and hence can not expose this issue.

The only other DAV provider shipped as part of Red Hat Enterprise Linux is mod_dav_svn that is part of subversion.  That is versioning provider and hence exposes issue in mod_dav's CHECKOUT and MERGE handlers.  It itself also calls the affected dav_xml_get_cdata() function directly.

Configurations using mod_dav_svn are known to be affected.  Configurations only using mod_dav_fs are not affected.

One way to ensure DAV functionality is not used and can not expose this issue is to avoid loading all dav modules by commenting all relevant LoadModule directives in httpd configuration.
Comment 17 Fedora Update System 2014-04-23 00:33:14 EDT
httpd-2.4.9-1.fc19 has been pushed to the Fedora 19 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 18 errata-xmlrpc 2014-06-23 13:55:32 EDT
This issue has been addressed in following products:

  JBoss Enterprise Web Server 2.0.1

Via RHSA-2014:0784 https://rhn.redhat.com/errata/RHSA-2014-0784.html
Comment 19 errata-xmlrpc 2014-06-23 13:55:59 EDT
This issue has been addressed in following products:

  JBEWS 2 for RHEL 5
  JBEWS 2 for RHEL 6

Via RHSA-2014:0783 https://rhn.redhat.com/errata/RHSA-2014-0783.html
Comment 20 errata-xmlrpc 2014-07-01 11:04:59 EDT
This issue has been addressed in following products:

  JBEAP 6.2 for RHEL 5
  JBEAP 6.2 for RHEL 6

Via RHSA-2014:0826 https://rhn.redhat.com/errata/RHSA-2014-0826.html
Comment 21 errata-xmlrpc 2014-07-01 11:05:22 EDT
This issue has been addressed in following products:

  Red Hat JBoss Enterprise Application Platform 6.2

Via RHSA-2014:0825 https://rhn.redhat.com/errata/RHSA-2014-0825.html

Note You need to log in before you can comment on or make changes to this bug.