Rapid7 Vulnerability & Exploit Database

RHSA-2002:103: Updated Apache packages fix chunked encoding issue

Back to Search

RHSA-2002:103: Updated Apache packages fix chunked encoding issue



The Apache Web server contains a security vulnerability which can be used to launch a denial of service attack or, in some cases, allow remote code execution.

Versions of the Apache Web server up to and including 1.3.24 contain a bug in the routines which deal with requests using "chunked" encoding. A carefully crafted invalid request can cause an Apache child process to call the memcpy() function in a way that will write past the end of its buffer, corrupting the stack. On some platforms this can be remotely exploited -- allowing arbitrary code to be run on the server. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2002-0392 to this issue. We have backported the security fix from the official Apache 1.3.26 release. This should help minimize the impact of upgrading to our errata packages. All users of Apache should update to these errata packages to correct this security issue. [Update Jun 26 2002] Updated packages have been added for Red Hat Linux for S/390. Slight changes to problem description to take into account possibility of exploits also on 32-bit platforms.


  • redhat-upgrade-apache
  • redhat-upgrade-apache-devel
  • redhat-upgrade-apache-manual

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center