Bugzilla will be upgraded to version 5.0 on a still to be determined date in the near future. The original upgrade date has been delayed.
Bug 733043 - (CVE-2003-1418) CVE-2003-1418 httpd information disclosure in FileEtag
CVE-2003-1418 httpd information disclosure in FileEtag
Status: CLOSED WONTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
public=20030225,reported=20110824,sou...
: Security
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2011-08-24 11:00 EDT by Josh Bressers
Modified: 2011-09-05 07:06 EDT (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2011-08-24 11:03:39 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Josh Bressers 2011-08-24 11:00:50 EDT
Apache HTTP Server allows remote attackers to obtain information via (1)
the ETag header, which reveals the inode number, or (2) multipart MIME
boundary, which reveals child proccess IDs (PID).
Comment 1 Josh Bressers 2011-08-24 11:03:39 EDT
Statement:

Red Hat does not consider this to be a security issue. The information returned poses no threat to the target machine running httpd.
Comment 2 Tomas Hoger 2011-09-05 07:06:42 EDT
Recent upstream discussion and upstream bug report:
http://thread.gmane.org/gmane.comp.apache.devel/45495
https://issues.apache.org/bugzilla/show_bug.cgi?id=49623

As pointed out there, content of the ETag header can be controlled using the FileETag directive.  Its default value is: INode MTime Size

Changing to MTime Size will cause httpd to not use file INode in the ETag headers.

http://httpd.apache.org/docs/2.2/mod/core.html#fileetag

Note You need to log in before you can comment on or make changes to this bug.