SSL_Util_UUEncode_Binary Stack Buffer Overflow Vulnerability

2004-05-25 Thread Boyle Owen
Greetings,

This alert has appeared recently. Is anyone aware of it? 

http://www.securityfocus.com/bid/10355/info/

There's nothing in CVE, Apache or mod_ssl about it...

Rgds,
Owen Boyle
Disclaimer: Any disclaimer attached to this message may be ignored. 

Diese E-mail ist eine private und persönliche Kommunikation. Sie hat
keinen Bezug zur Börsen- bzw. Geschäftstätigkeit der SWX Gruppe. This
e-mail is of a private and personal nature. It is not related to the
exchange or business activities of the SWX Group. Le présent e-mail est
un message privé et personnel, sans rapport avec l'activité boursière du
Groupe SWX.

This message is for the named person's use only. It may contain
confidential, proprietary or legally privileged information. No
confidentiality or privilege is waived or lost by any mistransmission.
If you receive this message in error, please notify the sender urgently
and then immediately delete the message and any copies of it from your
system. Please also immediately destroy any hardcopies of the message.
You must not, directly or indirectly, use, disclose, distribute, print,
or copy any part of this message if you are not the intended recipient.
The sender's company reserves the right to monitor all e-mail
communications through their networks. Any views expressed in this
message are those of the individual sender, except where the message
states otherwise and the sender is authorised to state them to be the
views of the sender's company. 


__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]


Re: SSL_Util_UUEncode_Binary Stack Buffer Overflow Vulnerability

2004-05-25 Thread Joe Orton
On Tue, May 25, 2004 at 09:42:58AM +0200, Boyle Owen wrote:
 Greetings,
 
 This alert has appeared recently. Is anyone aware of it? 

Yes, this is CVE CAN-2004-0488. It can only be triggered if mod_ssl is
configured to use FakeBasicAuth and will trust a CA which issues a
client cert with a 6K long subject DN.

I checked in a fix for 2.0 earlier:

http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/ssl/ssl_engine_kernel.c?r1=1.105r2=1.106

fixes for mod_ssl 2.8 should be forthcoming.

 http://www.securityfocus.com/bid/10355/info/

Regards,

joe
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]