Updated mod_auth_any packages are available for CentOS Linux. These updated packages fix vulnerabilities associated with the manner in which mod_auth_any escapes shell arguments when calling external programs.
The Web server module mod_auth_any allows the Apache httpd server to call arbitrary external programs to verify user passwords. Vulnerabilities have been found in versions of mod_auth_any included in Red Hat Enterprise Linux concerning the method by which mod_auth_any escapes shell arguments when calling external programs. These vulnerabilities allow remote attackers to run arbitrary commands as the user under which the Web server is running. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0084 to these issues. All users are advised to upgrade to these errata packages, which change the method by which external programs are invoked and, therefore, make these programs invulnerable to these issues. CentOS would like to thank Daniel Jarboe and Maneesh Sahani for bringing these issues to our attention.
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center