Apache Prefork MPM Vulnerabilities
by PSNC Security Team - Monday, 2 July 2007.
This case study is a result of source code analysis of Apache httpd server MPM modules. The main goal of this document is to show what may be done by an attacker who has the possibility of running arbitrary code in the context of the worker process (WP).

The work has been concentrated on verifying whether (and to which extent) it is secure to run an external code in the worker process context. Such code may be provided through appropriate functions of script languages attached as a module (like dl(), dlopen()) or as a result of running an exploit of one of vulnerabilities found in Apache modules (e.g. Integer Overflow in chunk_split() function). In order to simulate running an external code in the WP context we use dl() function from mod_php module.

Download the article in PDF format here.

Spotlight

Travel smart: Tips for staying secure on the road

Whether you're taking a personal holiday or a business trip, traveling by car or by plane, planning a quick jaunt or preparing for an extended stay, make sure your security best practices are coming along for the ride.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Tue, May 26th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //