Skip to navigation

Security Advisory mod_auth_any security update

Advisory: RHSA-2003:114-09
Type: Security Advisory
Severity: Important
Issued on: 2003-04-28
Last updated on: 2003-04-28
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2003-0084

Details

Updated mod_auth_any packages are available for Red Hat Enterprise Linux.
These updated packages fix vulnerabilities associated with the manner in
which mod_auth_any escapes shell arguments when calling external programs.

The Web server module mod_auth_any allows the Apache httpd server to
call arbitrary external programs to verify user passwords.

Vulnerabilities have been found in versions of mod_auth_any included in Red
Hat Enterprise Linux concerning the method by which mod_auth_any escapes
shell arguments when calling external programs. These vulnerabilities
allow remote attackers to run arbitrary commands as the user under which
the Web server is running. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CAN-2003-0084 to these issues.

All users are advised to upgrade to these errata packages, which change the
method by which external programs are invoked and, therefore, make these
programs invulnerable to these issues.

Red Hat would like to thank Daniel Jarboe and Maneesh Sahani for bringing
these issues to our attention.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/mod_auth_any/1.2.2-2/SRPMS/mod_auth_any-1.2.2-2.src.rpm
Missing file
    MD5: fdff9ef0f0ebceeed5fb74ef000439d9
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/mod_auth_any/1.2.2-2/i386/mod_auth_any-1.2.2-2.i386.rpm
Missing file
    MD5: 2da126608c09ef9ce8f617d4cbefd00b
 
IA-64:
ftp://updates.redhat.com/rhn/repository/NULL/mod_auth_any/1.2.2-2/ia64/mod_auth_any-1.2.2-2.ia64.rpm
Missing file
    MD5: 3e167cc091b577bb1fd6fe361f86ea48
 
Red Hat Enterprise Linux ES (v. 2.1)

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/mod_auth_any/1.2.2-2/SRPMS/mod_auth_any-1.2.2-2.src.rpm
Missing file
    MD5: fdff9ef0f0ebceeed5fb74ef000439d9
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/mod_auth_any/1.2.2-2/i386/mod_auth_any-1.2.2-2.i386.rpm
Missing file
    MD5: 2da126608c09ef9ce8f617d4cbefd00b
 
Red Hat Enterprise Linux WS (v. 2.1)

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/mod_auth_any/1.2.2-2/SRPMS/mod_auth_any-1.2.2-2.src.rpm
Missing file
    MD5: fdff9ef0f0ebceeed5fb74ef000439d9
 
IA-32:
ftp://updates.redhat.com/rhn/repository/NULL/mod_auth_any/1.2.2-2/i386/mod_auth_any-1.2.2-2.i386.rpm
Missing file
    MD5: 2da126608c09ef9ce8f617d4cbefd00b
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

SRPMS:
ftp://updates.redhat.com/rhn/repository/NULL/mod_auth_any/1.2.2-2/SRPMS/mod_auth_any-1.2.2-2.src.rpm
Missing file
    MD5: fdff9ef0f0ebceeed5fb74ef000439d9
 
IA-64:
ftp://updates.redhat.com/rhn/repository/NULL/mod_auth_any/1.2.2-2/ia64/mod_auth_any-1.2.2-2.ia64.rpm
Missing file
    MD5: 3e167cc091b577bb1fd6fe361f86ea48
 

Bugs fixed (see bugzilla for more information)

86508 - CAN-2003-0084 mod_auth_any uses unsafe quoting


References


Keywords

escape, mod_auth_any


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/