Apache-SSL buffer overflow condition (all versions prior to 1.3.22+1.46)
------------------------------------------------------------------------
Synopsis
--------
A buffer overflow was recently found in mod_ssl, see:
http://archives.neohapsis.com/archiv...2-02/0313.html
for details. The offending code in mod_ssl was, in fact, derived from
Apache-SSL, and Apache-SSL is also vulnerable.
As in mod_ssl, this flaw can only be exploited if client certificates
are being used, and the certificate in question must be issued by a
trusted CA.
Fix
---
Download Apache-SSL 1.3.22+1.47 from the usual places (see
http://www.apache-ssl.org/).
(note that 1.46 had a bug in it, so you should use 1.47)
Acknowledgements
----------------
Thanks to Ed Moyle for finding the flaw.
Rant
----
No thanks to anyone at all for alerting me before going
public. Cheers, guys.
Ben Laurie, March 1, 2002.