Hello,
I have asked this question previously on both the FreeBSD Mailing List and the mod_ssl mailing list, but didn't receive a response. I am currently running the Apache 2.2.8 port on the FreeBSD 6.3 platform with mod_ssl enabled. I received the following vulnerability scan results from my organization: Vulnerability: mod_ssl Off-By-One HTAccess Buffer Overflow Vulnerability Risk Level: Signature Group: Safe Description: The remote host is using a version of mod_ssl which is older than 2.8.10. This version is vulnerable to an off by one buffer overflow, which may allow a user with write access to .htaccess files to execute arbitrary code on the system with permissions of the web server. Resolution: Fixes have been made available by the affected vendor. We recommend upgrading mod_ssl to a more recent version that contains fixes addressing this issue. BugTraq: 5084 CVE: CVE-2002-0653 CVSS: 4.9 I referenced CVE-2002-0653, noting that it is from 2002, and noticed that there is no mention of this vulnerability affecting any version of apache paired with mod_ssl in the 2.x branches. I also can't find a version 2.8.10 or greater for Apache 2.2.8. I did find a site that mentioned certain distributions patched the apache software so that this vulnerability is no longer a concern. Could anyone give me some insight on this issue? Is there a document I overlooked that outlines remedial procedures, an updated ssl module, or has the software been patched to negate the vulnerability? I greatly appreciate any assistance on this matter, Mark