Common Vulnerabilities and Exposures assigned an identifier CVE-2013-6438 to the following vulnerability: Name: CVE-2013-6438 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438 Assigned: 20131104 Reference: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/util.c Reference: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/dav/main/util.c?r1=1528718&r2=1556428&diff_format=h Reference: http://www.apache.org/dist/httpd/CHANGES_2.4.9 The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request.
Created httpd tracking bugs for this issue: Affects: fedora-all [bug 1077878]
Upstream has described this issue as follows, which is a bit different from MITRE's description: XML parsing code in mod_dav incorrectly calculates the end of the string when removing leading spaces and places a NUL character outside the buffer, causing random crashes. This XML parsing code is only used with DAV provider modules that support DeltaV, of which the only publicly released provider is mod_dav_svn.
Detailed writeup from the original reporter at: http://www.drcruft.com/2014/03/apache-moddav-vulnerability-cve-2013.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2014:0369 https://rhn.redhat.com/errata/RHSA-2014-0369.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2014:0370 https://rhn.redhat.com/errata/RHSA-2014-0370.html
This flaw is in the dav_xml_get_cdata() function. In httpd itself, the function is called from handlers for CHECKOUT and MERGE methods, which are part of mod_dav. However, those handlers can only call those methods when used with versioning DAV "provider" (the one that sets vsn hooks in dav_provider structure). The httpd includes one DAV provider - DAV filesystem provider - implemented in module mod_dav_fs. This provider does not implement versioning hooks and hence can not expose this issue. The only other DAV provider shipped as part of Red Hat Enterprise Linux is mod_dav_svn that is part of subversion. That is versioning provider and hence exposes issue in mod_dav's CHECKOUT and MERGE handlers. It itself also calls the affected dav_xml_get_cdata() function directly. Configurations using mod_dav_svn are known to be affected. Configurations only using mod_dav_fs are not affected. One way to ensure DAV functionality is not used and can not expose this issue is to avoid loading all dav modules by commenting all relevant LoadModule directives in httpd configuration.
httpd-2.4.9-1.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: JBoss Enterprise Web Server 2.0.1 Via RHSA-2014:0784 https://rhn.redhat.com/errata/RHSA-2014-0784.html
This issue has been addressed in following products: JBEWS 2 for RHEL 5 JBEWS 2 for RHEL 6 Via RHSA-2014:0783 https://rhn.redhat.com/errata/RHSA-2014-0783.html
This issue has been addressed in following products: JBEAP 6.2 for RHEL 5 JBEAP 6.2 for RHEL 6 Via RHSA-2014:0826 https://rhn.redhat.com/errata/RHSA-2014-0826.html
This issue has been addressed in following products: Red Hat JBoss Enterprise Application Platform 6.2 Via RHSA-2014:0825 https://rhn.redhat.com/errata/RHSA-2014-0825.html