Bug 871309 (CVE-2013-5705) - VUL-0: CVE-2013-5705: apache2-mod_security2: bypass of intended rules via chunked requests
Summary: VUL-0: CVE-2013-5705: apache2-mod_security2: bypass of intended rules via chu...
Status: RESOLVED FIXED
Alias: CVE-2013-5705
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Deadline: 2014-07-21
Assignee: Roman Drahtmueller
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/97480/
Whiteboard: maint:released:sle11-sp3:58513
Keywords:
Depends on:
Blocks:
 
Reported: 2014-04-01 06:36 UTC by Alexander Bergmann
Modified: 2014-09-01 13:13 UTC (History)
5 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Alexander Bergmann 2014-04-01 06:36:01 UTC
Via rh#1082904:

Martin Holst Swende discovered a flaw in the way mod_security handled chunked requests. A remote attacker could use this flaw to bypass intended mod_security restrictions, allowing them to send requests containing content that should have been removed by mod_security.

This issue was corrected in mod_security version 2.7.6.

Upstream patch: https://github.com/SpiderLabs/ModSecurity/commit/f8d441cd25172fdfe5b613442fedfc0da3cc333d

CVE-2013-5705 was assigned to this issue.

References:
http://martin.swende.se/blog/HTTPChunked.html
https://bugzilla.redhat.com/show_bug.cgi?id=1082904
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-5705
Comment 1 Swamp Workflow Management 2014-04-01 22:00:20 UTC
bugbot adjusting priority
Comment 2 Swamp Workflow Management 2014-07-07 15:49:41 UTC
An update workflow for this issue was started.
This issue was rated as moderate.
Please submit fixed packages until 2014-07-21.
When done, reassign the bug to security-team@suse.de.
https://swamp.suse.de/webswamp/wf/58198
Comment 3 SMASH SMASH 2014-07-07 15:50:10 UTC
Affected packages:

SLE-11-SP3: apache2-mod_security2
Comment 4 Ruediger Oertel 2014-07-30 13:10:28 UTC
ping
Comment 5 Roman Drahtmueller 2014-07-30 16:42:13 UTC
SLE11 package was submitted. No notice about this yet in this bugzilla, though.
Comment 7 Ruediger Oertel 2014-07-30 20:07:09 UTC
package seen and checked in, thanks
Comment 8 Roman Drahtmueller 2014-07-31 08:18:16 UTC
openSUSE packages WIP
Comment 9 Bernhard Wiedemann 2014-07-31 14:00:33 UTC
This is an autogenerated message for OBS integration:
This bug (871309) was mentioned in
https://build.opensuse.org/request/show/243188 13.1+12.3 / apache2-mod_security2
https://build.opensuse.org/request/show/243191 Evergreen:11.4 / apache2-mod_security2.openSUSE_Evergreen_11.4
Comment 10 Bernhard Wiedemann 2014-08-01 02:00:19 UTC
This is an autogenerated message for OBS integration:
This bug (871309) was mentioned in
https://build.opensuse.org/request/show/243188 13.1+12.3 / apache2-mod_security2
https://build.opensuse.org/request/show/243191 Evergreen:11.4 / apache2-mod_security2.openSUSE_Evergreen_11.4
Comment 12 Alexander Bergmann 2014-08-06 09:49:19 UTC
A regression between which versions (RPM/SLE/openSUSE)?
Comment 13 Roman Drahtmueller 2014-08-06 10:07:36 UTC
investigating...
Comment 14 Liu Shukui 2014-08-06 10:15:34 UTC
(In reply to comment #12)
> A regression between which versions (RPM/SLE/openSUSE)?


fletcher:~ # cat /etc/SuSE-release 
SUSE Linux Enterprise Server 11 (x86_64)
VERSION = 11
PATCHLEVEL = 3

fletcher:~ # rpm -q apache2-mod_security2 
apache2-mod_security2-2.7.1-0.2.16.1
Comment 15 Roman Drahtmueller 2014-08-06 11:50:36 UTC
I cannot follow this - my tests have been successfully completed.
Shu Kui, which exact version of the apache2 package are you using?
Comment 16 Roman Drahtmueller 2014-08-06 11:58:41 UTC
/usr/lib/apache2/mod_security2.so is not a file that is contained in the 
package mentioned above. 
The setup is hosed, I'm afraid.
Either you test the 32bit stack, or the 64bit stack. Both mixed does not make sense.
Comment 17 Roman Drahtmueller 2014-08-06 12:44:26 UTC
ok, it's getting worse, unfortunately. On a 32bit stack consisting of glibc-32bit, libapr1(i586), libapr-util1 (i586), all apache packages 32bit arch, the daemon fails to load with the symbol error above.
Looking for m_strstr() in the libraries.
Comment 18 Roman Drahtmueller 2014-08-06 13:03:42 UTC
Corrected packages will be submitted shortly.
Comment 19 Roman Drahtmueller 2014-08-06 13:35:14 UTC
The problem was indeed that m_strstr() cannot be used in the context.
In fact, the compilation should have failed.
Shu Kui, could you reproduce the error with a clean setup?
Comment 21 Liu Shukui 2014-08-07 03:44:03 UTC
(In reply to comment #19)
> The problem was indeed that m_strstr() cannot be used in the context.
> In fact, the compilation should have failed.
> Shu Kui, could you reproduce the error with a clean setup?

I think it's a clean setup, because I've uninstall apache related packages and re-install them.

# rpm -qa| grep apache
apache2-2.2.12-1.46.1
apache2-mod_security2-2.7.1-0.2.16.1
apache2-utils-2.2.12-1.46.1
apache2-example-pages-2.2.12-1.46.1
apache2-doc-2.2.12-1.46.1
apache2-prefork-2.2.12-1.46.1

the regression testcase and test log will be attached.
Comment 23 Swamp Workflow Management 2014-08-07 21:04:58 UTC
openSUSE-SU-2014:0969-1: An update that solves 5 vulnerabilities and has one errata is now available.

Category: security (important)
Bug References: 859916,869105,869106,871309,887765,887768
CVE References: CVE-2013-5705,CVE-2013-6438,CVE-2014-0098,CVE-2014-0226,CVE-2014-0231
Sources used:
openSUSE 11.4 (src):    apache2-2.2.17-80.1, apache2-mod_security2-2.7.5-16.1
Comment 24 Swamp Workflow Management 2014-08-08 17:04:26 UTC
SUSE-SU-2014:0972-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 871309
CVE References: CVE-2013-5705
Sources used:
SUSE Linux Enterprise Server 11 SP3 for VMware (src):    apache2-mod_security2-2.7.1-0.2.18.1
SUSE Linux Enterprise Server 11 SP3 (src):    apache2-mod_security2-2.7.1-0.2.18.1
Comment 25 Swamp Workflow Management 2014-08-20 17:09:15 UTC
openSUSE-SU-2014:1047-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 871309
CVE References: CVE-2013-5705
Sources used:
openSUSE 13.1 (src):    apache2-mod_security2-2.8.0-4.4.1
openSUSE 12.3 (src):    apache2-mod_security2-2.7.5-2.10.1
Comment 26 Marcus Meissner 2014-09-01 13:13:27 UTC
released