SSL_Util_UUEncode_Binary Stack Buffer Overflow Vulnerability

SSL_Util_UUEncode_Binary Stack Buffer Overflow Vulnerability

am 25.05.2004 09:42:58 von Boyle Owen

Greetings,

This "alert" has appeared recently. Is anyone aware of it?=20

http://www.securityfocus.com/bid/10355/info/

There's nothing in CVE, Apache or mod_ssl about it...

Rgds,
Owen Boyle
Disclaimer: Any disclaimer attached to this message may be ignored.=20

Diese E-mail ist eine private und persönliche Kommunikation. Sie hat
keinen Bezug zur Börsen- bzw. Geschäftstätigkeit der SWX Gruppe. =
This
e-mail is of a private and personal nature. It is not related to the
exchange or business activities of the SWX Group. Le pr=E9sent e-mail =
est
un message priv=E9 et personnel, sans rapport avec l'activit=E9 =
boursi=E8re du
Groupe SWX.

This message is for the named person's use only. It may contain
confidential, proprietary or legally privileged information. No
confidentiality or privilege is waived or lost by any mistransmission.
If you receive this message in error, please notify the sender urgently
and then immediately delete the message and any copies of it from your
system. Please also immediately destroy any hardcopies of the message.
You must not, directly or indirectly, use, disclose, distribute, print,
or copy any part of this message if you are not the intended recipient.
The sender's company reserves the right to monitor all e-mail
communications through their networks. Any views expressed in this
message are those of the individual sender, except where the message
states otherwise and the sender is authorised to state them to be the
views of the sender's company.=20


____________________________________________________________ __________
Apache Interface to OpenSSL (mod_ssl) www.modssl.org
User Support Mailing List modssl-users@modssl.org
Automated List Manager majordomo@modssl.org

Re: SSL_Util_UUEncode_Binary Stack Buffer Overflow Vulnerability

am 25.05.2004 14:59:02 von Joe Orton

On Tue, May 25, 2004 at 09:42:58AM +0200, Boyle Owen wrote:
> Greetings,
>
> This "alert" has appeared recently. Is anyone aware of it?

Yes, this is CVE CAN-2004-0488. It can only be triggered if mod_ssl is
configured to use FakeBasicAuth and will trust a CA which issues a
client cert with a >6K long subject DN.

I checked in a fix for 2.0 earlier:

http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/ssl/ssl_ engine_kernel.c?r1=1.105&r2=1.106

fixes for mod_ssl 2.8 should be forthcoming.

> http://www.securityfocus.com/bid/10355/info/

Regards,

joe
____________________________________________________________ __________
Apache Interface to OpenSSL (mod_ssl) www.modssl.org
User Support Mailing List modssl-users@modssl.org
Automated List Manager majordomo@modssl.org