Gentoo Logo

Apache: Exposure of protected directories


1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200409-33 / net=www/apache
Release Date September 24, 2004
Latest Revision December 30, 2007: 02
Impact low
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
www-servers/apache = 2.0.51 >= 2.0.51-r1, < 2.0.51 All supported architectures

Related bugreports: #64804


A bug in the way Apache handles the Satisfy directive can lead to the exposure of protected directories to unauthorized users.

2.  Impact Information


The Apache HTTP server is one of most popular web servers on the Internet.


A bug in the way Apache handles the Satisfy directive, which is used to require that certain conditions (client host, client authentication, etc) be met before access to a certain directory is granted, could allow the exposure of protected directories to unauthorized clients.


Directories containing protected data could be exposed to all visitors to the webserver.

3.  Resolution Information


There is no known workaround at this time.


All Apache users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge sync
# emerge -pv ">=www-servers/apache-2.0.51-r1"
# emerge ">=www-servers/apache-2.0.51-r1"

4.  References


Page updated September 24, 2004

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2015 Gentoo Foundation, Inc. Questions, Comments? Contact us.