Re: [ANNOUNCE] mod_ssl 2.8.17 for Apache 1.3.31
On Fri, May 14, 2004, a k wrote: Did you add my eintr fix ? [...] Ops, I seem to have overlooked this. I'll include this into mod_ssl 2.8.18. Thanks. Ralf S. Engelschall [EMAIL PROTECTED] www.engelschall.com __ Apache Interface to OpenSSL (mod_ssl) www.modssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager[EMAIL PROTECTED]
[ANNOUNCE] mod_ssl 2.8.18
A security issue was discovered. It is now fixed with mod_ssl 2.8.18. Please upgrade your installations ASAP. o http://www.modssl.org/source/ o ftp://ftp.modssl.org/source/ Ralf S. Engelschall [EMAIL PROTECTED] www.engelschall.com Changes with mod_ssl 2.8.18 (11-May-2004 to 27-May-2004) *) Fix buffer overflow in SSLOptions +FakeBasicAuth implementation if the Subject-DN in the client certificate exceeds 6KB in length. (CVE CAN-2004-0488). *) Handle the case of OpenSSL retry requests after interrupted system calls during the SSL handshake phase. *) Remove some unused functions. __ Apache Interface to OpenSSL (mod_ssl) www.modssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager[EMAIL PROTECTED]
Re: [ANNOUNCE] mod_ssl 2.8.17 for Apache 1.3.31
test On Thu, 27 May 2004 14:49:35 +0200, Ralf S. Engelschall [EMAIL PROTECTED] wrote: On Fri, May 14, 2004, a k wrote: Did you add my eintr fix ? [...] Ops, I seem to have overlooked this. I'll include this into mod_ssl 2.8.18. Thanks. Ralf S. Engelschall [EMAIL PROTECTED] www.engelschall.com __ Apache Interface to OpenSSL (mod_ssl) www.modssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager[EMAIL PROTECTED] -- Using M2, Opera's revolutionary e-mail client: http://www.opera.com/m2/ __ Apache Interface to OpenSSL (mod_ssl) www.modssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager[EMAIL PROTECTED]
Re: [ANNOUNCE] mod_ssl 2.8.18
On Thu, May 27, 2004 at 15:21:37 +0200, Ralf S. Engelschall wrote: Changes with mod_ssl 2.8.18 (11-May-2004 to 27-May-2004) *) Fix buffer overflow in SSLOptions +FakeBasicAuth implementation if the Subject-DN in the client certificate exceeds 6KB in length. (CVE CAN-2004-0488). Is that also an issue in apache-2.x? (I wasn't able to find that CVE, so I ask here ;-) Best regards Udo -- Udo Schweigert, Siemens AG | Voice : +49 89 636 42170 CT IC CERT, Siemens CERT | Fax: +49 89 636 41166 D-81730 München / Germany| email : [EMAIL PROTECTED] __ Apache Interface to OpenSSL (mod_ssl) www.modssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager[EMAIL PROTECTED]
RE: [ANNOUNCE] mod_ssl 2.8.18
-Original Message- From: Udo Schweigert [mailto:[EMAIL PROTECTED] Sent: Donnerstag, 27. Mai 2004 17:03 To: [EMAIL PROTECTED] Subject: Re: [ANNOUNCE] mod_ssl 2.8.18 On Thu, May 27, 2004 at 15:21:37 +0200, Ralf S. Engelschall wrote: Changes with mod_ssl 2.8.18 (11-May-2004 to 27-May-2004) *) Fix buffer overflow in SSLOptions +FakeBasicAuth implementation if the Subject-DN in the client certificate exceeds 6KB in length. (CVE CAN-2004-0488). Is that also an issue in apache-2.x? (I wasn't able to find that CVE, so I ask here ;-) The problem was originally identified on apache2 (see http://www.securityfocus.com/bid/10355/) and it has already been patched there. Incidentally, AFAIK there is no vulnerability unless you are using SSLOptions FakeBasicAuth. It's a fairly specialised option so my feeling is that this doesn't urgently affect a whole lot of people... Of course, you should still upgrade just in case some time in the future you do switch that option on. Rgds, Owen Boyle Disclaimer: Any disclaimer attached to this message may be ignored. Best regards Udo -- Udo Schweigert, Siemens AG | Voice : +49 89 636 42170 CT IC CERT, Siemens CERT | Fax: +49 89 636 41166 D-81730 München / Germany| email : [EMAIL PROTECTED] __ Apache Interface to OpenSSL (mod_ssl) www.modssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager[EMAIL PROTECTED] Diese E-mail ist eine private und persönliche Kommunikation. Sie hat keinen Bezug zur Börsen- bzw. Geschäftstätigkeit der SWX Gruppe. This e-mail is of a private and personal nature. It is not related to the exchange or business activities of the SWX Group. Le présent e-mail est un message privé et personnel, sans rapport avec l'activité boursière du Groupe SWX. This message is for the named person's use only. It may contain confidential, proprietary or legally privileged information. No confidentiality or privilege is waived or lost by any mistransmission. If you receive this message in error, please notify the sender urgently and then immediately delete the message and any copies of it from your system. Please also immediately destroy any hardcopies of the message. You must not, directly or indirectly, use, disclose, distribute, print, or copy any part of this message if you are not the intended recipient. The sender's company reserves the right to monitor all e-mail communications through their networks. Any views expressed in this message are those of the individual sender, except where the message states otherwise and the sender is authorised to state them to be the views of the sender's company. __ Apache Interface to OpenSSL (mod_ssl) www.modssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager[EMAIL PROTECTED]
Re: [ANNOUNCE] mod_ssl 2.8.18
On Thu, May 27, 2004 at 05:09:17PM +0200, Boyle Owen wrote: On Thu, May 27, 2004 at 15:21:37 +0200, Ralf S. Engelschall wrote: Changes with mod_ssl 2.8.18 (11-May-2004 to 27-May-2004) *) Fix buffer overflow in SSLOptions +FakeBasicAuth implementation if the Subject-DN in the client certificate exceeds 6KB in length. (CVE CAN-2004-0488). Is that also an issue in apache-2.x? (I wasn't able to find that CVE, so I ask here ;-) The problem was originally identified on apache2 (see http://www.securityfocus.com/bid/10355/) and it has already been patched there. Anybody wanting to patch directly can fetch this: http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/ssl/ssl_engine_kernel.c?r1=1.105r2=1.106 Incidentally, AFAIK there is no vulnerability unless you are using SSLOptions FakeBasicAuth. It's a fairly specialised option so my feeling is that this doesn't urgently affect a whole lot of people... Of course, you should still upgrade just in case some time in the future you do switch that option on. And furthermore, you must trust a CA who will issue a client cert with exploit code embedded in the subject DN. Regards, joe __ Apache Interface to OpenSSL (mod_ssl) www.modssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager[EMAIL PROTECTED]
Re: [ANNOUNCE] mod_ssl 2.8.17 for Apache 1.3.31
Thanks !! ak --- Ralf S. Engelschall [EMAIL PROTECTED] wrote: On Fri, May 14, 2004, a k wrote: Did you add my eintr fix ? [...] Ops, I seem to have overlooked this. I'll include this into mod_ssl 2.8.18. Thanks. Ralf S. Engelschall [EMAIL PROTECTED] www.engelschall.com __ Apache Interface to OpenSSL (mod_ssl) www.modssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED] __ Do you Yahoo!? Friends. Fun. Try the all-new Yahoo! Messenger. http://messenger.yahoo.com/ __ Apache Interface to OpenSSL (mod_ssl) www.modssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager[EMAIL PROTECTED]
Re: [ANNOUNCE] mod_ssl 2.8.17 for Apache 1.3.31
I am away on paternity leave for the next few days. Please contact OLSU if urgent, otherwise i will get back to you as soon as possible on my return. __ Apache Interface to OpenSSL (mod_ssl) www.modssl.org User Support Mailing List [EMAIL PROTECTED] Automated List Manager[EMAIL PROTECTED]