Bug 871310 (CVE-2013-5704) - VUL-1: CVE-2013-5704: apache2: bypass of mod_headers rules via chunked requests
Summary: VUL-1: CVE-2013-5704: apache2: bypass of mod_headers rules via chunked requests
Status: RESOLVED FIXED
: 914535 (view as bug list)
Alias: CVE-2013-5704
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Deadline: 2015-04-08
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/97481/
Whiteboard: maint:released:sle11-sp1:61302 maint:...
Keywords:
Depends on:
Blocks:
 
Reported: 2014-04-01 06:41 UTC by Alexander Bergmann
Modified: 2015-07-26 19:08 UTC (History)
8 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
apache patches for 2.2.x and 2.4.x (33.00 KB, application/x-tar)
2014-12-17 11:20 UTC, Kristyna Streitova
Details

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2014-04-01 06:41:03 UTC
Via rh#1082903:

Martin Holst Swende discovered a flaw in the way mod_headers handled chunked requests. A remote attacker could use this flaw to bypass intended mod_headers restrictions, allowing them to send requests to applications that include headers that should have been removed by mod_headers.

Discussion and a possible patch is available from the following thread:

http://marc.info/?t=138219209900002&r=1&w=2

CVE-2013-5704 was assigned to this issue.

References:
http://martin.swende.se/blog/HTTPChunked.html
https://bugzilla.redhat.com/show_bug.cgi?id=1082903
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5704
Comment 1 Swamp Workflow Management 2014-04-01 22:00:27 UTC
bugbot adjusting priority
Comment 3 SMASH SMASH 2014-07-09 11:20:26 UTC
Affected packages:

SLE-11-SP3: apache2
Comment 4 Forgotten User Dw9P37_rnE 2014-11-21 13:35:57 UTC
Apache2 on OpenSuSE 12.3 (apache2-2.2.22-10.12.1) is also affected and given high severity by nessus.
Will there be work done on this vulnerability?
Comment 5 Bernhard Wiedemann 2014-11-28 17:00:23 UTC
This is an autogenerated message for OBS integration:
This bug (871310) was mentioned in
https://build.opensuse.org/request/show/263358 12.3 / apache2
Comment 6 Kristyna Streitova 2014-11-28 17:01:52 UTC
The CVE-2013-5704 was fixed in Apache httpd 2.2.29. So I have prepared an update for openSUSE 12.3.
Comment 7 Marcus Meissner 2014-12-03 13:49:40 UTC
    upstream fix in git
    https://github.com/apache/httpd/commit/bd34b9d92894b7fc01810fc11a059fa30067e431

    or svn

    http://svn.apache.org/viewvc?view=revision&revision=1610814


    introduces a new option to readd back legacy behaviuour
Comment 8 Marcus Meissner 2014-12-03 13:50:32 UTC
if we do fix apache2 on 12.3, we also need to fix apache2 on 13.1 and 13.2 
(fix is in 2.4.11 or backportable)
Comment 9 Kristyna Streitova 2014-12-03 18:38:11 UTC
You've right, thank you. I will add the fix from git to the next 13.1 and 13.2 update.
Comment 10 Swamp Workflow Management 2014-12-15 12:09:08 UTC
openSUSE-SU-2014:1647-1: An update that fixes 8 vulnerabilities is now available.

Category: security (moderate)
Bug References: 871310
CVE References: CVE-2011-3368,CVE-2012-2687,CVE-2013-1862,CVE-2013-1896,CVE-2013-6438,CVE-2014-0098,CVE-2014-0226,CVE-2014-0231
Sources used:
openSUSE 12.3 (src):    apache2-2.2.29-10.16.1
Comment 11 Jim Petersen 2014-12-15 21:32:01 UTC
Will a fix be provided for SLE as well (I am working with a customer needing it for SLES11SP3).

Thanks,
Jim
Comment 12 Kristyna Streitova 2014-12-16 13:07:22 UTC
The maintenance/submit requests for openSUSE and Factory have been created.

| Package       | #sr/#mr |
|===============|=========|
| openSUSE 12.3 | 263358  | version bump
| openSUSE 13.1 | 265405  |
| openSUSE 13.2 | 265405  |
| Factory       | 265358  |


The upstream patches can be found here:
  * Upstream trunk: https://github.com/apache/httpd/commit/bd34b9d92894b7fc01810fc11a059fa30067e431#diff-381c180d963fb4507c77d80edb208224
  * Upstream 2.4.x:	https://github.com/apache/httpd/commit/6688f9d102ad29d6bb4167d690ee495d709e47b6
  * Upstream 2.2.x:	https://github.com/apache/httpd/commit/16e241ed9f0482acfda30b115227101744ccbc2c
Comment 13 Kristyna Streitova 2014-12-17 11:20:17 UTC
Created attachment 617651 [details]
apache patches for 2.2.x and 2.4.x

I adapted the upstream patches for our use in apache 2.2.x (SLE11SP3) and 2.4.x. Ready for the maintenance update.
Comment 17 Forgotten User DAOOQRPXab 2014-12-29 15:19:22 UTC
Any update on this?
Comment 18 Swamp Workflow Management 2014-12-29 16:06:09 UTC
openSUSE-SU-2014:1726-1: An update that solves two vulnerabilities and has four fixes is now available.

Category: security (moderate)
Bug References: 792309,842377,849445,864166,871310,909715
CVE References: CVE-2013-5704,CVE-2014-8109
Sources used:
openSUSE 13.2 (src):    apache2-2.4.10-4.1
openSUSE 13.1 (src):    apache2-2.4.6-6.37.1
openSUSE 12.3 (src):    apache2-2.2.29-10.20.1
Comment 19 Kristyna Streitova 2014-12-31 17:33:04 UTC
(In reply to Richard Hamilton from comment #17)
> Any update on this?

This bug is marked as "planned maintenance update" so we are waiting till the security team gives instruction to submit.
Comment 20 Leonardo Chiquitto 2015-03-11 12:51:16 UTC
*** Bug 914535 has been marked as a duplicate of this bug. ***
Comment 21 Swamp Workflow Management 2015-03-11 13:58:26 UTC
An update workflow for this issue was started.
This issue was rated as low.
Please submit fixed packages until 2015-04-08.
https://swamp.suse.de/webswamp/wf/61064
Comment 24 Kristyna Streitova 2015-04-02 16:33:25 UTC
Submitted to:
  - SLE10SP3: https://build.suse.de/request/show/54652
  - SLE11SP1: https://build.suse.de/request/show/53778
  - SLE12: https://build.suse.de/request/show/54654

I'm reassigning it back to security-team.
Comment 25 Swamp Workflow Management 2015-04-08 23:05:16 UTC
SUSE-SU-2015:0689-1: An update that contains security fixes can now be installed.

Category: security (moderate)
Bug References: 713970,871310,899836,904427,907339,907477
CVE References: 
Sources used:
SUSE Linux Enterprise Software Development Kit 11 SP3 (src):    apache2-2.2.12-1.51.52.1
SUSE Linux Enterprise Server 11 SP3 for VMware (src):    apache2-2.2.12-1.51.52.1
SUSE Linux Enterprise Server 11 SP3 (src):    apache2-2.2.12-1.51.52.1
Comment 26 Swamp Workflow Management 2015-06-01 07:05:49 UTC
SUSE-SU-2015:0974-1: An update that solves four vulnerabilities and has two fixes is now available.

Category: security (moderate)
Bug References: 792309,871310,899836,909715,918352,923090
CVE References: CVE-2013-5704,CVE-2014-3581,CVE-2014-8109,CVE-2015-0228
Sources used:
SUSE Linux Enterprise Software Development Kit 12 (src):    apache2-2.4.10-12.1
SUSE Linux Enterprise Server 12 (src):    apache2-2.4.10-12.1
Comment 27 Victor Pereira 2015-07-26 19:08:19 UTC
fixed, released and closed.