Forum OpenACS Q&A: Pound vulnerability

Collapse
Posted by Carl Robert Blesius on

Just wanted to post this here, because I know of a couple of people use pound around here to create the illusion of running more than one OpenACS server on the same IP:PORT (e.g. I do -- the upgrade went smoothly.)

Carl

=================

Package : pound

Vulnerability : several

Problem-Type : remote

Debian-specific: no

CVE ID : CVE-2005-1391 CVE-2005-3751

Debian Bug : 307852

Two vulnerabilities have been discovered in Pound, a reverse proxy and
load balancer for HTTP. The Common Vulnerabilities and Exposures project
identifies the following problems:


* CVE-2005-1391:

Overly long HTTP Host: headers may trigger a buffer overflow in the
add_port() function, which may lead to the execution of arbitrary
code.



* CVE-2005-3751:

HTTP requests with conflicting Content-Length and Transfer-Encoding
headers could lead to HTTP Request Smuggling Attack, which can be
exploited to bypass packet filters or poison web caches.

The old stable distribution (woody) does not contain pound packages.

For the stable distribution (sarge) these problems have been fixed in
version 1.8.2-1sarge1

For the unstable distribution (sid) these problems have been fixed in
version 1.9.4-1

We recommend that you upgrade your pound package.

==================