<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic [CERT Security Bulletin CERT-2002-17] Apache Web Server Chunk Handling Vulnerability in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/cert-security-bulletin-cert-2002-17-apache-web-server-chunk/m-p/2746703#M753454</link>
    <description />
    <pubDate>Tue, 18 Jun 2002 00:52:11 GMT</pubDate>
    <dc:creator>Steven Sim Kok Leong</dc:creator>
    <dc:date>2002-06-18T00:52:11Z</dc:date>
    <item>
      <title>[CERT Security Bulletin CERT-2002-17] Apache Web Server Chunk Handling Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/cert-security-bulletin-cert-2002-17-apache-web-server-chunk/m-p/2746703#M753454</link>
      <description />
      <pubDate>Tue, 18 Jun 2002 00:52:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/cert-security-bulletin-cert-2002-17-apache-web-server-chunk/m-p/2746703#M753454</guid>
      <dc:creator>Steven Sim Kok Leong</dc:creator>
      <dc:date>2002-06-18T00:52:11Z</dc:date>
    </item>
    <item>
      <title>Re: [CERT Security Bulletin CERT-2002-17] Apache Web Server Chunk Handling Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/cert-security-bulletin-cert-2002-17-apache-web-server-chunk/m-p/2746704#M753455</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Apache has released a new version of apache which fixes the vulnerabilities:&lt;BR /&gt;&lt;BR /&gt;References: &lt;BR /&gt;&lt;BR /&gt;1) &lt;A href="http://httpd.apache.org/info/security_bulletin_20020617.txt" target="_blank"&gt;http://httpd.apache.org/info/security_bulletin_20020617.txt&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;2) &lt;A href="http://www.apacheweek.com/issues/02-06-21" target="_blank"&gt;http://www.apacheweek.com/issues/02-06-21&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards.&lt;BR /&gt;&lt;BR /&gt;Steven Sim Kok Leong</description>
      <pubDate>Thu, 20 Jun 2002 13:15:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/cert-security-bulletin-cert-2002-17-apache-web-server-chunk/m-p/2746704#M753455</guid>
      <dc:creator>Steven Sim Kok Leong</dc:creator>
      <dc:date>2002-06-20T13:15:44Z</dc:date>
    </item>
    <item>
      <title>Re: [CERT Security Bulletin CERT-2002-17] Apache Web Server Chunk Handling Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/cert-security-bulletin-cert-2002-17-apache-web-server-chunk/m-p/2746705#M753456</link>
      <description>How long will it be before HP releases their patch?</description>
      <pubDate>Fri, 21 Jun 2002 12:05:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/cert-security-bulletin-cert-2002-17-apache-web-server-chunk/m-p/2746705#M753456</guid>
      <dc:creator>Tod Wiederholt</dc:creator>
      <dc:date>2002-06-21T12:05:06Z</dc:date>
    </item>
    <item>
      <title>Re: [CERT Security Bulletin CERT-2002-17] Apache Web Server Chunk Handling Vulnerability</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/cert-security-bulletin-cert-2002-17-apache-web-server-chunk/m-p/2746706#M753457</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;To test whether your apache server is vulnerable, just run this command (you will need perl and netcat installed on your server:&lt;BR /&gt;&lt;BR /&gt;# perl -e 'print "POST http://www/index.html HTTP/1.1\r\nAccept: */*\r\nHost: www\r\nContent-Type: application/x-www-form-urlencoded\r\nTransfer-Encoding: chunked\r\nContent-length: 5000\r\n\r\n" . "A"x5000 . "\r\n\r\n"' | nc localhost 80 &lt;BR /&gt;&lt;BR /&gt;If it is vulnerable, you will see the following error message in your error log: &lt;BR /&gt;&lt;BR /&gt;# tail -1 /etc/httpd/logs/error_log &lt;BR /&gt;[Fri Jun 21 09:18:45 2002] [notice] child pid 14358 exit signal Segmentation fault (11) &lt;BR /&gt;&lt;BR /&gt;Please test your apache vulnerability on your system! And to reiterate the information on the solution, users of Apache 1.3 should upgrade to 1.3.26, and users of Apache 2.0 should upgrade to 2.0.39, which contain a fix for this issue.&lt;BR /&gt;&lt;BR /&gt;According to the code in one of the exploits, it was stated that other OSes are vulnerable (contrary to ISS belief that only some 64-bit Unix and Win32 apache are vulnerable):&lt;BR /&gt;&lt;BR /&gt; * However, contrary to what ISS would have you believe, we have &lt;BR /&gt; * successfully exploited this hole on the following operating systems: &lt;BR /&gt; * &lt;BR /&gt; *      Sun Solaris 6-8 (sparc/x86) &lt;BR /&gt; *      FreeBSD 4.3-4.5 (x86) &lt;BR /&gt; *      OpenBSD 2.6-3.1 (x86) &lt;BR /&gt; *      Linux (GNU) 2.4 (x86) &lt;BR /&gt;&lt;BR /&gt;In particular, note that Sun Solaris 6,7,8 on Sparc as well as Linux kernel 2.4 is vulnerable to the exploit. &lt;BR /&gt;&lt;BR /&gt;Hope this helps. Regards. &lt;BR /&gt;&lt;BR /&gt;Steven Sim Kok Leong</description>
      <pubDate>Fri, 21 Jun 2002 23:28:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/cert-security-bulletin-cert-2002-17-apache-web-server-chunk/m-p/2746706#M753457</guid>
      <dc:creator>Steven Sim Kok Leong</dc:creator>
      <dc:date>2002-06-21T23:28:26Z</dc:date>
    </item>
  </channel>
</rss>

