Forum OpenACS Q&A: Pound vulnerability
Just wanted to post this here, because I know of a couple of people use pound around here to create the illusion of running more than one OpenACS server on the same IP:PORT (e.g. I do -- the upgrade went smoothly.)
Package : pound
Vulnerability : several
Problem-Type : remote
CVE ID : CVE-2005-1391 CVE-2005-3751
Debian Bug : 307852
Two vulnerabilities have been discovered in Pound, a reverse proxy and
load balancer for HTTP. The Common Vulnerabilities and Exposures project
identifies the following problems:
Overly long HTTP Host: headers may trigger a buffer overflow in the
add_port() function, which may lead to the execution of arbitrary
HTTP requests with conflicting Content-Length and Transfer-Encoding
headers could lead to HTTP Request Smuggling Attack, which can be
exploited to bypass packet filters or poison web caches.
The old stable distribution (woody) does not contain pound packages.
For the stable distribution (sarge) these problems have been fixed in
For the unstable distribution (sid) these problems have been fixed in
We recommend that you upgrade your pound package.