Gentoo Logo

Apache: Exposure of protected directories

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 200409-33 / net=www/apache
Release Date September 24, 2004
Latest Revision December 30, 2007: 02
Impact low
Exploitable remote
Package Vulnerable versions Unaffected versions Architecture(s)
www-servers/apache = 2.0.51 >= 2.0.51-r1, < 2.0.51 All supported architectures

Related bugreports: #64804

Synopsis

A bug in the way Apache handles the Satisfy directive can lead to the exposure of protected directories to unauthorized users.

2.  Impact Information

Background

The Apache HTTP server is one of most popular web servers on the Internet.

Description

A bug in the way Apache handles the Satisfy directive, which is used to require that certain conditions (client host, client authentication, etc) be met before access to a certain directory is granted, could allow the exposure of protected directories to unauthorized clients.

Impact

Directories containing protected data could be exposed to all visitors to the webserver.

3.  Resolution Information

Workaround

There is no known workaround at this time.

Resolution

All Apache users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge sync
# emerge -pv ">=www-servers/apache-2.0.51-r1"
# emerge ">=www-servers/apache-2.0.51-r1"

4.  References



Print

Page updated September 24, 2004

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.