GLSA 200401-03: Apache mod_python Denial of Service vulnerability

Severity:low
Title:Apache mod_python Denial of Service vulnerability
Date:01/27/2004
Bugs: #39154
ID:200401-03

Synopsis

Apache's mod_python module could crash the httpd process if a specific, malformed query string was sent.

Background

Mod_python is an Apache module that embeds the Python interpreter within the server allowing Python-based web-applications to be created.

Affected packages

Package Vulnerable Unaffected Architecture(s)
www-apache/mod_python < 2.7.10 >= 2.7.10 All supported architectures

Description

The Apache Foundation has reported that mod_python may be prone to Denial of Service attacks when handling a malformed query. Mod_python 2.7.9 was released to fix the vulnerability, however, because the vulnerability has not been fully fixed, version 2.7.10 has been released.

Users of mod_python 3.0.4 are not affected by this vulnerability.

Impact

Although there are no known public exploits known for this exploit, users are recommended to upgrade mod_python to ensure the security of their infrastructure.

Workaround

Mod_python 2.7.10 has been released to solve this issue; there is no immediate workaround.

Resolution

All users using mod_python 2.7.9 or below are recommended to update their mod_python installation:

    $> emerge sync
    $> emerge -pv ">=www-apache/mod_python-2.7.10"
    $> emerge ">=www-apache/mod_python-2.7.10"
    $> /etc/init.d/apache restart

References

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-200401-03.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

Thank you!