Rapid7 Vulnerability & Exploit Database

RHSA-2003:113: Updated mod_auth_any packages available

Back to Search

RHSA-2003:113: Updated mod_auth_any packages available

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
05/12/2003
Created
07/25/2018
Added
10/28/2005
Modified
07/04/2017

Description

Updated mod_auth_any packages are now available for Red Hat Linux.

mod_auth_any is a Web server module that allows the Apache httpd server to call arbitrary external programs to verify user passwords. Vulnerabilities have been found in the way mod_auth_any escapes shell arguments when calling external programs. Versions of mod_auth_any included in Red Hat Linux 7.2 and 7.3 are affected. These vulnerabilities allow remote attackers to run arbitrary commands as the user under which the Web server is running. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0084 to these issues. All users are advised to upgrade to these errata packages, which address these vulnerabilities by changing the method by which external programs are invoked. Note: This updated module is more careful in checking the results of the AuthAnyUserProg. Previous versions did not distinguish between the program outputting nothing due to success or a crash. This replacement version treats a zero-length result as if it were an "Authentication Error," and expects the program to output a valid username on success. Red Hat would like to thank Daniel Jarboe and Maneesh Sahani for bringing these issues to our attention.

Solution(s)

  • redhat-upgrade-mod_auth_any

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;