===================================================================== CERT-Renater Note d'Information No. 2009/VULN028 _____________________________________________________________________ DATE : 16/01/2009 HARDWARE PLATFORM(S) : / OPERATING SYSTEM(S) : Solaris 8, Solaris 9, Solaris 10, running Apache 1.3 mod_perl Component "PerlRun.pm". ====================================================================== http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-66-248386-1 ______________________________________________________________________ Solution Type: Sun Alert Solution 248386 : Security vulnerability in Solaris Related to the Apache 1.3 mod_perl(3) Module Component "PerlRun.pm" may Lead to Denial of Service (DoS) Bug ID: 6738158 Product Solaris 8 Operating System Solaris 9 Operating System Solaris 10 Operating System Date of Workaround Release: 14-Jan-2009 SA Document Body Security vulnerability in Solaris related to the Apache 1.3 mod_perl(3) module component "PerlRun.pm" may lead to Denial of Service (DoS): 1. Impact A security vulnerability in Solaris related to the Apache HTTP server may affect the Apache 1.3 web server bundled with Solaris 8, 9 and 10 . The vulnerability, a Denial of Service(DoS) in the "RunPerl.pm" component of the mod_perl(3) Apache server module, may allow a remote unprivileged user to cause a Denial of Service to the Apache "httpd" process. Additional information regarding this issue is available at: * CVE-2007-1349 at: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1349 2. Contributing Factors This issue can occur in the following releases: SPARC Platform * Solaris 8 * Solaris 9 * Solaris 10 without patch 122911-14 * OpenSolaris based upon builds snv_01 through snv_99 x86 Platform * Solaris 8 * Solaris 9 * Solaris 10 without patch 122912-14 * OpenSolaris based upon builds snv_01 through snv_99 Note 1: OpenSolaris distributions may include additional bug fixes above and beyond the build from which it was derived. To determine the base build of OpenSolaris, the following command can be used: $ uname -v snv_86 Note 2: A system is only vulnerable to this issue if the Apache 1.3 web server has been configured and is running on the system. To determine if the Apache 1.3 web server is running on the system, the following command can be used: $ /usr/bin/ps -ef | grep "/usr/apache/bin/http" nobody 103892 102307 0 Jan 20 ? 0:27 /usr/apache/bin/httpd Note 3: This vulnerability only affects systems which make use of the Apache Server mod_perl(3) (PerlRun.pm) component. To determine if the "PerlRun.pm" component is used, a command such as the following can be run for all configuration files that define the running Apache 1.3 configuration: $ grep PerlHandler /etc/apache/httpd.conf | grep Apache::PerlRun PerlHandler Apache::PerlRun 3. Symptoms If the issue is exploited, the Apache 1.3 web server may be unresponsive, possibly consuming all available CPU resources. Commands such as prstat(1M) can be used to determine the utilization of system resources: $ prstat -s cpu [...] 4. Workaround To work around the described issue, make sure that the mod_perl(3) (PerlRun.pm) component is not configured in the Apache 1.3 "httpd.conf" file. 5. Resolution This issue is addressed in the following releases: SPARC Platform * Solaris 10 with patch 122911-14 or later * OpenSolaris based upon build snv_100 or later x86 Platform * Solaris 10 with patch 122912-14 or later * OpenSolaris based upon build snv_100 or later A final resolution is pending completion. For more information on Security Sun Alerts, see Technical Instruction ID 213557. This Sun Alert notification is being provided to you on an "AS IS" basis. This Sun Alert notification may contain information provided by third parties. The issues described in this Sun Alert notification may or may not impact your system(s). Sun makes no representations, warranties, or guarantees as to the information contained herein. ANY AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. This Sun Alert notification contains Sun proprietary and confidential information. It is being provided to you pursuant to the provisions of your agreement to purchase services from Sun, or, if you do not have such an agreement, the Sun.com Terms of Use. This Sun Alert notification may only be used for the purposes contemplated by these agreements. Copyright 2000-2008 Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved ========================================================= Les serveurs de référence du CERT-Renater http://www.urec.fr/securite http://www.cru.fr/securite http://www.renater.fr ========================================================= + CERT-RENATER | tel : 01-53-94-20-44 + + 151 bd de l'Hopital | fax : 01-53-94-20-41 + + 75013 Paris | email: certsvp@renater.fr + =========================================================