Apache Prefork MPM Vulnerabilities
by PSNC Security Team - Monday, 2 July 2007.
This case study is a result of source code analysis of Apache httpd server MPM modules. The main goal of this document is to show what may be done by an attacker who has the possibility of running arbitrary code in the context of the worker process (WP).

The work has been concentrated on verifying whether (and to which extent) it is secure to run an external code in the worker process context. Such code may be provided through appropriate functions of script languages attached as a module (like dl(), dlopen()) or as a result of running an exploit of one of vulnerabilities found in Apache modules (e.g. Integer Overflow in chunk_split() function). In order to simulate running an external code in the WP context we use dl() function from mod_php module.

Download the article in PDF format here.

Spotlight

How GitHub is redefining software development

Posted on 26 January 2015.  |  The security industry is slowly realizing what the developer community knew for years - collaboration is the key to and likely the future of innovation.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Tue, Jan 27th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //