|
Release Notes HP-UX Web Server Suite
TABLE OF CONTENTS
Overview
What's New
- HP-UX Apache-based Web Server
- HP-UX Tomcat-based Servlet Engine
- HP-UX Webmin-based Admin
- HP-UX XML Web Server Tools
Documentation
Miscellaneous
Legal Notices
Notes: Please refer to /opt/hpws/LICENSES/ to view HP's license, terms,
and warranty for all components.
OVERVIEW
The HP-UX Web Server Suite is a free product that can be downloaded for the
HP-UX platform. It includes key software products necessary to deploy, manage,
and implement mission critical web servers. The suite is comprised of:
HP-UX Apache-based Web Server
HP-UX Tomcat-based Servlet Engine
HP-UX Webmin-based Admin
HP-UX XML Web Server Tools
These components are based on software developed by the Apache Software
Foundation (http://www.apache.org) and Webmin (http://www.webmin.com/).
- HP-UX Apache-based Web Server combines numerous popular modules from
other Open Source projects and provides HP value-added features for
the HP-UX platform
* Scripting capabilities: PHP, mod_perl, CGI
* Content management: WebDAV, FrontPage Server Extensions
* Security: authentication through an LDAP server, Chrooted environment,
SSL and TLS support, Webproxy
- HP-UX Webmin-based Admin is a Configuration and Administration GUI with
extensive enhancements for the HP-UX Apache-based Web Server.
- HP-UX Tomcat-based Servlet Engine provides customers Java-based extensions
for dynamic content generation via Servlets and JavaServer Pages (JSPs).
- HP-UX XML Web Server Tools is a collection of a Java-based XML tools used
for XML parsing, stylesheet and XSL processing, web-publishing and image
translating from the open source projects: Xerces, Xalan, Cocoon, FOP and
Batik.
HP enhances the software in the areas of performance, encryption, reliability,
customization and administration. HP ensures the suite of products work
together with the HP-UX 11.x operating environment. Additionally Oracle, BEA,
Siebel and other application vendors have developed application plug-ins for the
HP-UX Web Server Suite. The different components of the HP-UX Web Server Suite
have demonstrated leadership in the following areas: Reliability, Availability,
Serviceability, Internet and Web Application Services, Scalability, Directory
and Security Services. The HP-UX Web Server Suite is supported at no additional
charge for customers with HP-UX support agreements.
The HP-UX Web Server Suite runs on a wide array of HP hardware to match your
workload and cost effectiveness requirements. The suite runs with HP-UX 11.0
and HP-UX 11i on the PA-RISC family of 64-bit RP hardware servers. It also
operates with HP-UX 11i on the Intel Itanium 64-bit family of hardware servers.
The same HP-UX Web Server Suite runs on both low-end and high-end HP-UX servers
to provide you with consistent administration and high returns on your IT
investment.
For the latest information on the HP-UX Web Server Suite, see
http://www.hp.com/go/webserver/
WHAT'S NEW
Depending on what you've chosen to install, the following new features may
be available for you. Their respective Release Notes and Admin Guides will
provide detail about their features.
HP-UX Apache-based Web Server
This release of HP-UX Apache-based Server is primarily a security and
bug fix release.
- Apache upgraded to 2.0.58
The following security vulnerabilities have been fixed in this release.
mod_rewrite: Fix an off-by-one security problem in the ldap scheme
handling. For some RewriteRules this could lead to a pointer being
written out of bounds. Reported by Mark Dowd of McAfee Avert Labs.
More details are available at
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3747">http://cve.mitre.org/cgi-bin/c
vename.cgi?name=CVE-2006-3747</a>
mod_ssl in Apache 2.0 up to 2.0.55, when configured with an SSL vhost
with access control and a custom error 400 error page, allows remote
attackers to cause a denial of service (application crash) via a
non-SSL request to an SSL port, which triggers a NULL pointer dereference.
More details are available at
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3357">http://cve.mitre.org/cgi-bin/c
vename.cgi?name=CVE-2005-3357</a>
Cross-site scripting (XSS) vulnerability in the mod_imap module of Apache
httpd before 1.3.35-dev and Apache httpd 2.0.x before 2.0.56-dev allows
remote attackers to inject arbitrary web script or HTML via the Referer
when using image maps.
More details are available at
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3352">http://cve.mitre.org/cgi-bin/c
vename.cgi?name=CVE-2005-3352</a>
- mod_perl supports perl 5.8.8
- mod_jk upgraded to 1.2.15
- mod_jk2 upgraded to 2.0.5
- PHP extension, oci8 upgraded to 1.1
- Bug Fixes
Added a new Apache module, mod_auth_kerb.
Added a new PHP extension, openssl.
Added OCSP support for mod_ssl.
auth_ldap is no longer shipped with HP-UX Web Server Suite.
mod_perl fixed to display the entire process name on inclusion of
<Perl> directive in the configuration file.
Openldap fixed to prevent core dump on loading and unloading of
ldap.sl, a PHP extension.
mod_jk2 now recognises ipv6 addresses.
The PHP extension pgsql.sl now links to the latest version of
libpq.
Running multiple instances of Apache has been documented.
libtool fixed to not refer to /CLO/BUILD_ENV.
SSL admin guide updated with the updatecrl option.
mod_ssl doesn't conflict with RSA's sslc library.
The correct version of Openssl binary is now displayed on the command prompt.
mod_ldap fixed to prevent segmentation fault when used for authentication.
This release of HP-UX Apache-based Server is primarily a security and
bug fix release.
- The following security vulnerabilities have been fixed in this release.
The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5,
when register_globals is enabled, allows remote attackers to modify
the GLOBALS array and bypass security protections of PHP applications via
a multipart/form-data POST request with a "GLOBALS" fileupload field.
More details are available at
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3390
The SSL/TLS server implementation in OpenSSL 0.9.7 before 0.9.7h
and 0.9.8 before 0.9.8a, when using the SSL_OP_MSIE_SSLV2_RSA_PADDING
option, disables a verification step that is required for preventing
protocol version rollback attacks, which allows remote attackers to force
a client and server to use a weaker protocol than needed via a man-in-the-middle
attack.
More details are available at
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2969
- Bug Fixes
Apache is fixed to solve the problem of Content-Length header not being present
in HEAD response when used as a front-end server
mod_perl fixed to honor Perl's $| "OUTPUT_AUTOFLUSH" for STDOUT
Apache is fixed to stop without errors in Chrooted environment
mod_proxy is fixed to solve the problem of data loss with httpd-2.0.55
reverse proxy method=post.
This release of HP-UX Apache-based Web Server is primarily a security and
bug fix release.
- Apache upgraded to 2.0.55
The following security vulnerabilities have been fixed in this release.
Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions
(PCRE) before 6.2, as used in multiple products such as Python, allows
attackers to execute arbitrary code via quantifier values in regular
expressions, which leads to a heap-based buffer overflow.
More details are available at
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2491
Off-by-one error in the mod_ssl Certificate Revocation List (CRL)
verification callback in Apache, when configured to use a CRL, allows
remote attackers to cause a denial of service (child process crash) via
a CRL that causes a buffer overflow of one null byte.
More details are available at
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1268
The byte-range filter in Apache 2.0 before 2.0.54 allows remote attackers
to cause a denial of service (memory consumption) via an HTTP header with
a large Range field.
More details are available at
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2728
Apache 2.0.45 and 1.3.29, when acting as an HTTP proxy, allows remote
attackers to poison the web cache, bypass web application firewall protection,
and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked"
header and a Content-Length header, which causes Apache to incorrectly handle
and forward the body of the request in a way that causes the receiving server
to process it as a separate HTTP request, aka "HTTP Request Smuggling."
More details are available at
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2088
- Bug Fixes
Added support for Nested mutexes.
To enable C++ modules, the following 3 lines must be added to the httpd.conf
file, if not present.
For 11iv2 IA 64-bit platforms, the directives to load the standard C++ libraries
are:
LoadFile /usr/lib/hpux64/libunwind.so
LoadFile /usr/lib/hpux64/libCsup.so
LoadFile /usr/lib/hpux64/libstd_v2.so
For 11iv2 IA 32-bit platforms, the directives to load the standard C++ libraries
are:
LoadFile /usr/lib/hpux32/libunwind.so
LoadFile /usr/lib/hpux32/libCsup.so
LoadFile /usr/lib/hpux32/libstd_v2.so
For all other flavors, the directives to load the classic C++ libraries are
provided.
LoadFile /usr/lib/libCsup.sl
LoadFile /usr/lib/libstream.sl
LoadFile /usr/lib/libstd.sl
NOTE: To use the LoadFile directive, the following patches are required.
For 11iv1:
PHSS_30968 - ld(1) and linker tools cumulative patch
PHSS_32573 - s700_800 11.11 HP aC++ -AA runtime libraries (aCC A.03.61)
For 11.00:
PHSS_30969 s700_800 11.00 ld(1) and linker tools cumulative patch
PHSS_32574 s700_800 11.X HP aC++ -AA runtime libraries (aCC A.03.61)
For 11iv2: No patches are required
Please note that the LoadFile directive must precede the LoadModule
directive for C++ modules.
- Apache upgraded to 2.0.54.02
This release of HP-UX Apache-based Web Server is a bug fix release.
mod_ssl in Apache webserver 2.0.54.00 and earlier, when using
"SSLVerifyClient optional" in the global virtual host configuration,
does not properly enforce "SSLVerifyClient require" in a per-location
context, which allows remote attackers to bypass intended access
restrictions.
The MySQL extension for PHP is provided as an external library on
HP-UX 11i and HP-UX 11iv2 32 bit versions.
Previous releases contained the following security fixes, bug fixes and
enhancements:
- Apache upgraded to 2.0.54
This release of HP-UX Apache-based Web Server is a bug fix release.
- Apache upgraded to 2.0.54
- mod_jk upgraded to 1.2.10
- OpenSSL upgraded to 0.9.7g
- mod_perl supports perl 5.8.3
- PHP upgraded to 5.0.4
- Apache upgraded to 2.0.53
Apache webserver 2.0.52 and earlier allows remote attackers to cause a
denial of service (CPU consumption) via an HTTP GET request with a MIME
header containing multiple lines with a large number of space characters.
More details are available at
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0942
- Apache upgraded to 2.0.52
The IPv6 URI parsing routines in the apr-util library for Apache 2.0.50 and
earlier allow remote attackers to cause a denial of service (child process
crash) via a certain URI, as demonstrated using the Codenomicon HTTP Test
Tool.
More details are available at
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0786
Buffer overflow in Apache 2.0.50 and earlier allows local users to gain
apache privileges via a .htaccess file that causes the overflow during
expansion of environment variables.
More details are available at
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747
The char_buffer_read function in the mod_ssl module for Apache 2.x, when
using reverse proxying to an SSL server, allows remote attackers to cause
a denial of service (segmentation fault).
More details are available at
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0751
mod_ssl in Apache 2.0.50 and earlier allows remote attackers to cause a
denial of service (CPU consumption) by aborting an SSL connection in a way
that causes an Apache child process to enter an infinite loop.
More details are available at
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0748
The mod_dav module in Apache 2.0.50 and earlier allows remote attackers to
cause a denial of service (child process crash) via a certain sequence of
LOCK requests for a location that allows WebDAV authoring access.
More details are available at
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0809
Vulnerability in Apache 2.0.51 prevents the merging of the Satisfy
directive, which could allow attackers to obtain access to restricted
resources contrary to the specified authentication configuration.
More details are available at
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0811
- mod_perl upgraded to 1.99_16
- Apache upgraded to 2.0.50
A remotely triggered memory leak in http header parsing can allow a denial
of service attack due to excessive memory consumption. [CAN-2004-0493]
More details are available at
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0493
Fixes a mod_ssl buffer overflow in the FakeBasicAuth code for a (trusted)
client certificate subject DN which exceeds 6K in length. [CAN-2004-0488]
More details are available at
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0488
- PHP upgraded to 4.3.8
The memory_limit functionality, under certain conditions such as when
register_globals is enabled, allows remote attackers to execute arbitrary
code by triggering a memory_limit abort during execution of the
zend_hash_init function and overwriting a HashTable destructor pointer
before the initialization of key data structures is complete. [CAN-2004-0594]
More details are available at
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0594
The strip_tags function, does not filter null (\0) characters within tag
names when restricting input to allowed tags, which allows dangerous tags
to be processed by web browsers such as Internet Explorer and Safari, which
ignore null characters and facilitate the exploitation of cross-site
scripting (XSS) vulnerabilities. [CAN-2004-0595]
More details are available at
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0595
- Apache(mod_ssl): Extended support for 'RequestHeader' directive
When the Proxy feature is used, the RequestHeader directive can
be used to send any environment variables/values to the backend server.
- Apache(mod_ssl): Support for updating CRL without re-starting the web server
A new option 'updatecrl' was added to apachectl. This new option will
allow to update the Certificate Revocation List without taking down
the web server.
- Bug fixes:
mod_ssl: Fix a SEGV that occurs when small cache size is specified.
mod_cgi: Fix a hang problem with scripts that used timeouts (ex. ping)
- Apache upgraded to 2.0.49:
Apache does not filter terminal escape sequences from error logs, which
could make it easier for attackers to insert those sequences into terminal
emulators.
More details are available at
<a href=":">http://cve.mitre.org/">http://cve.mitre.org/:
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0020">
CAN-2003-0020</a>
Starvation issue on listening sockets occurs when a short-lived connection
on a rarely-accessed listening socket will cause a child to hold the accept
mutex and block out new connections.
More details are available at
<a href=":">http://cve.mitre.org/">http://cve.mitre.org/:
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0174">
CAN-2004-0174</a>
Memory leak in mod_ssl allows a remote denial of service attack against a
SSL-enabled server by sending plain HTTP requests to the SSL port.
More details are available at
<a href=":">http://cve.mitre.org/">http://cve.mitre.org/:
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0113">
CAN-2004-0113</a>
Mod_ssl is not sending the "Close Notify" alert message before closing the
socket
SSL variables are not detected correctly in RewriteCond
- OpenSSL upgraded to 0.9.7.d
The do_change_cipher_spec function in OpenSSL allows remote attackers to cause
a denial of service via a crafted SSL/TLS handshake that triggers a null
dereference.
More details are available at
<a href=":">http://cve.mitre.org/">http://cve.mitre.org/:
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079">
CAN-2004-0079</a>
The SSL/TLS handshaking, when using Kerberos ciphersuites, does not properly
check the length of Kerberos tickets during a handshake, which allows
remote attackers to cause a denial of service via a crafted SSL/TLS handshake
that causes an out-of-bounds read.
More details are available at
<a href=":">http://cve.mitre.org/">http://cve.mitre.org/:
<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112">
CAN-2004-0112</a>
PKCS7-S/MIME encryption fails with memory fault core dump
- C++ plug-in modules
C++ plug-in modules on IPF should now be built with the Standard C++
runtime libraries. This is a change from previous versions which used
Classic C++ runtime libraries. Plug-ins for PA should continue to use
the Classic C++ runtime libraries. From more information see,
Apache Admin Guide
HP-UX Tomcat-based Servlet Engine
HP-UX Tomcat-based Servlet Engine 5.5.9:
This release of HP-UX Tomcat-based Servlet Engine A.5.5.9.01 contains
Tomcat 5.5.9.00 which implements Servlet 2.4 and JSP 2.0 specifications.
This release contains Tomcat version 5.5.9.00. Apart from being an
implementation of new specifications of Servlet and JSP, it includes several
new features, enhancements, performance optimizations, and bug fixes over the
previous releases (Tomcat 4.1.x).
Previous releases contained the following security fixes, bug fixes and
enhancements:
- Tomcat version upgrade to 4.1.29.06
- Commons-DBCP upgraded to 1.2.1
- Now onwards mod_jk and related configuration files are shipped with HP-UX
Apache-based Web Server.
- Fix to the Tomcat Admin application that had affected numerous Tomcat
administrative tasks.
HP-UX Webmin-based Admin
HP-UX Webmin-based Admin A.1.070.08:
This release of HP-UX Webmin-based Admin is a bug fix release that
addresses the following defects:
- Webmin has been fixed to display the correct page after configuring
a theme.
This release of HP-UX Webmin-based Admin is a security/bug fix release that
addresses the following vulnerablilties:
- corruption of the SSL virtual server configuration (JAGaf41910).
This release also includes enhancements/bug fixes from A.1.070.01
- Disabled read access to module configuration for normal users.
- DOS attack(Locking out other users) when logging in using space in
username.
- Support for 32-bit Apache (if installed)
- Backup, version management(RCS) and retrieval of Apache configuration
files.
- Direct access to
launching HP-UX Tomcat-based Servlet Engine
invoking Tomcat's Management and Admin tools
- Consolidated log display page which now provides a single portal for
viewing all log files.
- Support for easy management of log rotation
- Intuitive server status and info configuration and viewing
- Enhanced certificate management including addition of PEM pass phrases
to keys and deploying a key/certificate pair to a Virtual Server.
- Support for Virtual Host additions and management
- Enhanced look and feel (new icons, intuitive forms, Javascript event handlers)
- Improved parsing of Apache configuration files to accurately handle
directives within Virtual Hosts, Directory, and other containers.
- Various bug fixes
HP-UX XML Web Server Tools
HP-UX XML Web Server Tools A.2.00:
This release is primarily a version upgrade release:
- Xerces-J v. 2.5.0
- Xalan-J v. 2.5.1
- Cocoon v. 2.0.4
- FOP v. 0.20.5
- Batik v. 1.5
DOCUMENTATION
The Release Notes, Admin Guides, User Guides and Migration Guides
included in this bundle can be found in /opt/hpws/hp_docs/
Depending on which components are installed, these documents can also be
accessd from the following servers if they were started with the default
configurations:
HP-UX Apache-based Web Server http://yourserver.com/
HP-UX Tomcat-based Servlet Engine http://yourserver.com:8081/
HP-UX Webmin-based Admin http://yourserver.com:10000/
***************************************************************************
LEGAL NOTICES
The information in this document is subject to change without notice.
WARRANTY DISCLAIMER
HEWLETT-PACKARD MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS
INFORMATION, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. Hewlett-Packard
shall not be liable for errors contained herein or for direct, indirect,
special, incidental or consequential damages in connection with the
furnishing, performance or use of this material.
RESTRICTED RIGHTS LEGEND
Use, duplication or disclosure by the U.S. Government is subject to
restrictions as set forth in subparagraph (c) (1) (ii) of the Rights in
Technical Data and Computer Software clause at DFARS 252.227-7013 for DOD
agencies. Rights for non-DOD U.S. Government Department and Agencies are
as set forth in FAR 52.227-19 (c)(1,2).
COPYRIGHT NOTICES
Copyright 2002-2006 Hewlett-Packard Development Company, L.P.
This document contains information which is protected by copyright.
All Rights Reserved. Reproduction, adaptation, or translation without
prior written permission is prohibited, except as allowed under the
copyright laws.
TRADEMARK NOTICES
UNIX is a registered trademark in the United States and other countries,
licensed exclusively through X/Open Company Limited.
Java and all Java-based trademarks and logos are trademarks or
registered trademarks of Sun Microsystems, Inc. in the U.S. and
other countries.
Netscape is a U.S. trademark of Netscape Communications Corporation.
Oracle is a registered U.S. trademark of Oracle Corporation, Redwood City,
California.
ACKNOWLEDGEMENTS
This product includes software developed by the Apache Software Foundation.
This documentation is based on information from the Apache Software Foundation
(http://www.apache.org).
This product includes software developed by the OpenLDAP Project
(http://www.openldap.org).
This product includes software developed by the OpenSSL Project for use
in the OpenSSL Toolkit (http://www.openssl.org).
This product includes cryptographic software written by Eric Young
([email protected]).
This product includes PHP, freely available from (http://www.php.net).
|