HPSBGN01144 SSRT0817 SSRT0821 rev.2 - Compaq Secure Web Server Using PHP and Apache mod_ssl, Remote Execution of Arbitrary Code

  • KM02992243
  • 17-Oct-2017
  • 17-Oct-2017

Summary

Potential Security Vulnerabilities with Compaq Secure Web Server (CSWS) using PHP and Apache mod_ssl could allow for remote execution of arbitrary code.

Reference

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: KM02992243 (c01037883)

Version: 2

HPSBGN01144 SSRT0817 SSRT0821 rev.2 - Compaq Secure Web Server Using PHP and Apache mod_ssl, Remote Execution of Arbitrary Code
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.

Release Date: 2002-03-28

Last Updated: 2007-04-26


Potential Security Impact: Remote Execution of Arbitrary Code

Source: Hewlett-Packard Company, HP Software Security Response Team

VULNERABILITY SUMMARY

Potential Security Vulnerabilities with Compaq Secure Web Server (CSWS) using PHP and Apache mod_ssl could allow for remote execution of arbitrary code.

References: CVE Candidate PHP (CAN-2002-0081) , Apache mod_ssl (CAN-2002-0082)

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

CSWS (SSRT0817) PHP (SSRT0821) Apache mod_ssl 
OpenVMS V7.1-2 or later CSWS_PHP V1.0 CSWS V1.0-1, CSWS V1.1-1, CSWS V1.2 
TRU64 UNIX V5.0A or later CSWS V5.5.2 CSWS V5.5.2

BACKGROUND

For a PGP signed version of this security bulletin please write to: security-alert@hp.com

(SSRT0817) PHP

PHP (Hypertext Preprocessor scripting language). PHP does not perform proper bounds checking on in functions related to Form-based File Uploads in HTML to decode MIME encoded files. This potential buffer overflow vulnerability may allow arbitrary code to be executed.

(SSRT0821) Apache mod_ssl

Apache/mod_ssl session cache management routines use an unchecked buffer that could potentially allow an overflow of a session cache buffer. This potential vulnerability may allow arbitrary code to be executed.

RESOLUTION

Compaq has corrected both problems and created patches that are now available for CSWS (Compaq Secure Web Server) for OpenVMS and TRU64 UNIX.

CSWS for OpenVMS V7.1-2 or later:

A Compaq Secure Web Server security update kit is available for download at:http://www.openvms.compaq.com/openvms/products/ips/apache/csws_patches.html Non-HPE site

(SSRT0817) PHP

Installed Version - Update Kit

CSWS_PHP 1.0 update to CSWS_PHP10_UPDATE V1.0

NOTE: (SSRT0817) PHP - For OpenVMS - if upgrading is not possible or a patch cannot be applied immediately, the potential PHP overflow vulnerability may be minimized by adding the following line to MOD_PHP.CONF file: PHP_FLAG file_uploads OFF This will prevent using fileuploads, which may not be an acceptable short-term solution.

(SSRT0821) Apache/mod_ssl

Installed Version - Update Kit

CSWS V1.2 update to CSWS12_UPDATE V1.0

CSWS V1.1-1 update to CSWS111_UPDATE V1.0

CSWS V1.0-1 update to CSWS101_UPDATE V1.0

TRU64 UNIX for V5.0a or later:

Compaq Secure Web Server security update kit is available for download at:http://tru64unix.compaq.com/internet/download.htm#sws_v582  Non-HPE site select and install the CSWS (Compaq Secure Web Server) kit V5.8.2

Installed Version - Updated Server Kit

CSWS V5.5.2 update to CSWS V5.8.2

HISTORY 
Revision: 0 (rev.0) - 28 March 2002 Initial release 
Version: 1 (rev.1) - 16 May 2005 Reformatted 
Version: 2 (rev.2) - 26 April 2007 Reformatted

©Copyright 2007 Hewlett-Packard Development Company, L.P.
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.