Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 66425 - Apache htpasswd Local Overflow (net-www/apache 1.3.31) -revised-
Summary: Apache htpasswd Local Overflow (net-www/apache 1.3.31) -revised-
Status: RESOLVED INVALID
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://www.osvdb.org/10068
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2004-10-05 07:11 UTC by Marc Vila
Modified: 2011-10-30 22:39 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marc Vila 2004-10-05 07:11:33 UTC
A remote overflow exists in Apache. The htpasswd binary fails to perform proper bounds checking resulting in a buffer overflow. With a specially crafted request containing user and passwd variables, a remote attacker can cause arbitrary code execution resulting in a loss of integrity.

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Reproducible: Always
Steps to Reproduce:
1.
2.
3.




External References:

Nessus Script ID: 14771 
ISS X-Force ID: 17413 
Vendor URL: http://www.apache.org 
Security Mail List Post: 
http://archives.neohapsis.com/archives/fulldisclosure/2004-09/0547.html 

http://www.osvdb.org/10068
Comment 1 Thierry Carrez (RETIRED) gentoo-dev 2004-10-05 07:54:02 UTC
Lot of confusion over this thing. It's a buffer overflow in htpasswd.c failing to sanitize user input. So local user can walk over his feet and execute arbitrary code with his local rights. Yoohoo.

It's not SUID, so the only option I see would be if it was called remotely by a password-updating script or whatever, and that script/PHP/whatever would fail to check input ?

OSVDB[1] got it wrong, it's not a remote vulnerability (description is incorrect, title is correct)

ISS[2] got it wrong too. "A local attacker can use this vulnerability to overflow a buffer and execute arbitrary code on the system." Right. Do they know what a local user is ?

Yes, it should be fixed. And no, I don't think it's a vulnerability.
Please, prove me wrong.

[1] http://www.osvdb.org/10068
[2] http://xforce.iss.net/xforce/xfdb/17413
Comment 2 Thierry Carrez (RETIRED) gentoo-dev 2004-10-06 13:57:26 UTC
Following my report, ISS corrected their advisory and downgraded the severity :
"A local attacker, within the same permissions assigned to the attacker, could exploit this vulnerability to overflow a buffer and execute arbitrary code on the system."
It's not really better, but at least it's correct.

In the original advisory :
"Vendor Notified: Two months ago, but we got no answer."
No kidding.

Closing this one as bogus. Feel free to reopen if you disagree.