Apache Software Foundation assigned an identifier CVE-2010-1452 to the following vulnerability: A flaw was found in the handling of requests by mod_cache and mod_dav. A malicious remote attacker could send a carefully crafted request and cause a httpd child process to crash. This crash would only be a denial of service if using the worker MPM. This issue is further mitigated as mod_dav is only affected by requests that are most likely to be authenticated, and mod_cache is only affected if the uncommon CacheIgnoreURLSessionIdentifiers" directive, introduced in version 2.2.14, is used. References: [1] http://httpd.apache.org/security/vulnerabilities_22.html Upstream bug report: [2] https://issues.apache.org/bugzilla/show_bug.cgi?id=49246 Upstream patch: [3] http://svn.apache.org/viewvc?view=revision&revision=966349 Credit: Mark Drayton More reproducer details from [2]: (https://issues.apache.org/bugzilla/show_bug.cgi?id=49246#c0) When configured with a virtual host, caching and a non-empty CacheIgnoreURLSessionIdentifiers parameter httpd segfaults on requests with no path. Configuration: NameVirtualHost *:80 <VirtualHost *:80> ServerName www.example.com CacheEnable disk / CacheRoot /tmp/cache-root CacheDefaultExpire 86400 CacheIgnoreURLSessionIdentifiers cachebuster </VirtualHost> Test: host:~ tail -0f logs/error_log & [1] 7637 host:~ (echo "GET http://www.example.com HTTP/1.0"; echo) | nc localhost 80 [Tue May 04 14:12:47 2010] [notice] child pid 7617 exit signal Segmentation fault (11)
This issue did NOT affect the versions of the httpd package, as shipped with Red Hat Enterprise Linux 3 and 4. This issue affects the version of the httpd package, as shipped with Red Hat Enterprise Linux 5. This issue affects the version of the httpd package, as shipped with JBoss Enterprise Web Server 1.0.1 for Red Hat Enterprise Linux 4 and 5. This issue affects the versions of the httpd package, as shipped with Fedora release of 12 and 13.
Created httpd tracking bugs for this issue Affects: fedora-all [bug 618192]
Statement: (none)
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2010:0659 https://rhn.redhat.com/errata/RHSA-2010-0659.html
The fix for this will be driven by this Jira: https://jira.jboss.org/browse/JBPAPP-4884
(In reply to comment #1) > This issue did NOT affect the versions of the httpd package, as shipped > with Red Hat Enterprise Linux 3 and 4. mod_dav issue affected httpd 2.0.x versions too and hence affect httpd packages in Red Hat Enterprise Linux 3 and 4 too. Issue was fixed upstream in the following 2.0.x branch commit: http://svn.apache.org/viewvc?view=revision&revision=1005655 included in upstream version 2.0.64: http://httpd.apache.org/security/vulnerabilities_20.html#2.0.64
This issue has been addressed in following products: JBoss Enterprise Web Server 1.0 Via RHSA-2011:0896 https://rhn.redhat.com/errata/RHSA-2011-0896.html
This issue has been addressed in following products: JBEWS 1.0 for RHEL 5 JBEWS 1.0 for RHEL 4 JBEWS 1 for RHEL 6 Via RHSA-2011:0897 https://rhn.redhat.com/errata/RHSA-2011-0897.html