version 1.508, 2004/08/30 01:35:39 |
version 1.509, 2004/09/10 18:30:45 |
|
|
<a name="all"></a> |
<a name="all"></a> |
<h3><font color="#e00000">All architectures</font></h3> |
<h3><font color="#e00000">All architectures</font></h3> |
<ul> |
<ul> |
|
<li><a name="httpd2"></a> |
|
<font color="#009000"><strong>018: SECURITY FIX: September 10, 2004</strong></font><br> |
|
<a href="http://www.openbsd.org/cgi-bin/man.cgi?query=httpd&apropos=0&sektion=8&manpath=OpenBSD+Current&arch=i386&format=html">httpd(8)</a> |
|
's mod_rewrite module can be made to write one zero byte in an arbitrary memory |
|
position outside of a char array, causing a DoS or possibly buffer overflows. |
|
This would require enabling dbm for mod_rewrite and making use of a malicious |
|
dbm file. |
|
<br> |
|
<a href="ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.5/common/018_httpd2.patch"> |
|
A source code patch exists which remedies this problem</a>.<br> |
|
<p> |
<li><a name="libz"></a> |
<li><a name="libz"></a> |
<font color="#009000"><strong>017: RELIABILITY FIX: August 29, 2004</strong></font><br> |
<font color="#009000"><strong>017: RELIABILITY FIX: August 29, 2004</strong></font><br> |
Due to incorrect error handling in zlib an attacker could potentially cause a Denial |
Due to incorrect error handling in zlib an attacker could potentially cause a Denial |