(CVE-2009-5031) <modsecurity-apache-2.6.6 : Multipart Quote Parsing Security Bypass Vulnerability (CVE-2009-5031 CVE-2012-2751)

Bug #1016909 reported by Karma Dorje
258
This bug affects 1 person
Affects Status Importance Assigned to Milestone
libapache-mod-security (Debian)
Fix Released
Unknown
libapache-mod-security (Ubuntu)
Invalid
Undecided
Unassigned
modsecurity-apache (Debian)
Fix Released
Unknown
modsecurity-apache (Ubuntu)
Invalid
Undecided
Unassigned

Bug Description

From secunia security advisory at URL [1]:

Description
A vulnerability has been reported in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

The vulnerability is caused due to an error when parsing quotes within multipart requests and can be exploited to bypass certain filtering rules.

The vulnerability is reported in versions prior to 2.6.6.

Solution
Update to version 2.6.6.

From oss-sec at URL [2]:

CVE request for mod_security multi-part bypass:

This issue was partially fixed in 2009 and then corrected
completely (I hope =) in 2012, so 2 CVE's.

2009:
https://www.modsecurity.org/fisheye/browse/modsecurity/m2/branches/2.5.x/apache2/msc_multipart.c?r2=1419&r1=1366

Please

use CVE-2009-5031 for this issue.

2012: commit c5d749a0d809cf24335cd35720d7eac99ba7ea44 Author:
brenosilva <brenosilva () 9017d574-64ec-4062-9424-5e00b32a252b> Date:
Fri Jun 1 20:16:06 2012 +0000 MODSEC-312 svn co
https://mod-security.svn.sourceforge.net/svnroot/mod-security/m2/trunk

modsecurity
svn diff -r 1917:1918

Please use CVE-2012-2751 for this issue.

- --
Kurt Seifried Red Hat Security Response Team (SRT)

[1] https://secunia.com/advisories/49576/
[2] http://seclists.org/oss-sec/2012/q2/533

Changed in modsecurity-apache (Debian):
status: Unknown → New
Revision history for this message
Tyler Hicks (tyhicks) wrote :

Thanks for taking the time to report this bug and helping to make Ubuntu better. Since the package referred to in this bug is in universe or multiverse, it is community maintained. If you are able, I suggest coordinating with upstream and posting a debdiff for this issue. When a debdiff is available, members of the security team will review it and publish the package. See the following link for more information: https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures

Changed in modsecurity-apache (Ubuntu):
status: New → Incomplete
Changed in modsecurity-apache (Debian):
status: New → Incomplete
Changed in libapache-mod-security (Debian):
status: Unknown → New
Changed in modsecurity-apache (Debian):
status: Incomplete → Fix Released
Tyler Hicks (tyhicks)
Changed in libapache-mod-security (Ubuntu):
status: New → Incomplete
Changed in libapache-mod-security (Debian):
status: New → Fix Released
Revision history for this message
Launchpad Janitor (janitor) wrote :

This bug was fixed in the package libapache-mod-security - 2.5.11-1ubuntu0.1

---------------
libapache-mod-security (2.5.11-1ubuntu0.1) lucid-security; urgency=low

  * SECURITY UPDATE: bypass multipart filtering using invalid quoting
    (LP: #1016909)
    - debian/patches/CVE-2012-2751: Fix detection of invalid
      quotes. Thanks to Alberto Gonzalez Iniesta for the backported patch
    - Patch taken from Oneiric package
    - CVE-2012-2751
  * SECURITY UPDATE: disclosure of local files or denial of service by
    resource exhaustion via XML External Entity (XEE) attacks
    (LP: #1169030)
    - debian/patches/CVE-2013-1915.patch: Add an option to allow loading
      external entities (disabled by default). Backported from upstream
      patch
    - d4d80b38aa85eccb26e3c61b04d16e8ca5de76fe
    - CVE-2013-1915
 -- Evan Broder <email address hidden> Tue, 16 Apr 2013 09:05:37 -0700

Changed in libapache-mod-security (Ubuntu):
status: Incomplete → Fix Released
Revision history for this message
Jamie Strandboge (jdstrand) wrote :

We are closing this bug report because it lacks the information we need to investigate the problem, as described in the previous comments. Please reopen it if you can give us the missing information, and don't hesitate to submit bug reports in the future. To reopen the bug report you can click on the current status, under the Status column, and change the Status back to 'New'. Thanks again!

Changed in libapache-mod-security (Ubuntu):
status: Fix Released → Invalid
Changed in modsecurity-apache (Ubuntu):
status: Incomplete → Invalid
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.