First published: Fri Apr 19 2013(Updated: )
It was found that mod_rewrite writes data to a log file without sanitizing non-printable characters. A remote attacker could use this flaw to write terminal escape sequences to log files (if the RewriteLog directive was used by mod_rewrite). This could possibly cause arbitrary command execution, via HTTP requests containing an escape sequence for a terminal emulator. (if for example the log files were viewed in a terminal emulator) Reference: <a href="http://svn.apache.org/viewvc?view=revision&revision=r1469311">http://svn.apache.org/viewvc?view=revision&revision=r1469311</a> Proposed patch: <a href="http://people.apache.org/~jorton/mod_rewrite-CVE-2013-1862.patch">http://people.apache.org/~jorton/mod_rewrite-CVE-2013-1862.patch</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.0.65 | 2.0.65 |
redhat/httpd | <2.2.25 | 2.2.25 |
Apache HTTP Server | >=2.0.0<2.0.65 | |
Apache HTTP Server | >=2.2.0<2.2.25 | |
redhat jboss enterprise application platform | =6.0.0 | |
redhat jboss enterprise application platform | =6.4.0 | |
Red Hat Enterprise Linux | =5.0 | |
Red Hat Enterprise Linux | =6.0 | |
Oracle HTTP Server | =10.1.3.5.0 | |
Oracle HTTP Server | =11.1.1.7.0 | |
Oracle HTTP Server | =12.1.2.0 | |
Oracle HTTP Server | =12.1.3.0 | |
redhat enterprise Linux desktop | =5.0 | |
redhat enterprise Linux desktop | =6.0 | |
redhat enterprise Linux eus | =5.9 | |
redhat enterprise Linux eus | =6.4 | |
redhat enterprise Linux server | =5.0 | |
redhat enterprise Linux server | =6.0 | |
redhat enterprise Linux server aus | =5.9 | |
redhat enterprise Linux server aus | =6.4 | |
redhat enterprise Linux workstation | =5.0 | |
redhat enterprise Linux workstation | =6.0 | |
Ubuntu Linux | =10.04 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =12.10 | |
Ubuntu Linux | =13.04 | |
openSUSE | =11.4 | |
openSUSE | =12.2 | |
openSUSE | =12.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1862 has a medium severity rating as it could allow arbitrary command execution due to improper handling of non-printable characters in log files.
To fix CVE-2013-1862, you should upgrade to at least httpd version 2.0.65 or 2.2.25 as per your system's configuration.
CVE-2013-1862 affects various versions of Apache HTTP Server and Red Hat JBoss Enterprise Application Platform.
Yes, CVE-2013-1862 can be exploited remotely by an attacker if the RewriteLog directive is used.
The potential consequences of CVE-2013-1862 include unauthorized command execution and possible system compromise.