Bug 112956 - Hijacking Apache https by mod_php
Summary: Hijacking Apache https by mod_php
Status: CLOSED UPSTREAM
Alias: None
Product: Fedora
Classification: Fedora
Component: httpd
Version: 1
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Joe Orton
QA Contact:
URL:
Whiteboard:
Keywords: Security
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2004-01-06 17:31 UTC by Robert Scheck
Modified: 2007-11-30 22:10 UTC (History)
1 user (show)

(edit)
Clone Of:
(edit)
Last Closed: 2004-02-11 17:24:51 UTC


Attachments (Terms of Use)

Description Robert Scheck 2004-01-06 17:31:31 UTC
Description of problem, how reproducible and steps to reproduce:
Mod_php under Apache 2.0.x leaks a critical file descriptor that 
can be used to takeover (hijack) the https service.

All in all it's described at Bugtraq:
http://www.securityfocus.com/archive/1/348368

Version-Release number of selected component (if applicable):
httpd-2.0.48-4

Actual results:
I talked with a guy of php.net, he said, that it is an Apache 
related problem, so something like that is maybe possible with 
phyton, too. He said too, that Apache will provide a patch for 
that - anytime...

Expected results:
Fixed httpd asap ;) the fix is like this:

  fcntl( X, F_SETFD, FD_CLOEXEC );

But the question is where to place it, X should also be replaced
with the real variable's name. 

Additional info:
Red Hat Linux 9 is vulnerable, too.

Comment 1 Joe Orton 2004-02-11 17:24:51 UTC
This "leaking" of file descriptors does not have security implications
unless you consider that the PHP interpreter provides a "security
sandbox" from which it is possible to run untrusted code.  For further
information, read our write-up in ApacheWeek:

http://www.apacheweek.com/issues/04-01-23#security



Note You need to log in before you can comment on or make changes to this bug.