diff options
Diffstat (limited to 'metadata/glsa/glsa-200602-03.xml')
-rw-r--r-- | metadata/glsa/glsa-200602-03.xml | 99 |
1 files changed, 99 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-200602-03.xml b/metadata/glsa/glsa-200602-03.xml new file mode 100644 index 000000000000..26d6ee249e9a --- /dev/null +++ b/metadata/glsa/glsa-200602-03.xml @@ -0,0 +1,99 @@ +<?xml version="1.0" encoding="utf-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> + +<glsa id="200602-03"> + <title>Apache: Multiple vulnerabilities</title> + <synopsis> + Apache can be exploited for cross-site scripting attacks and is vulnerable + to a Denial of Service attack. + </synopsis> + <product type="ebuild">Apache</product> + <announced>February 06, 2006</announced> + <revised>December 30, 2007: 03</revised> + <bug>115324</bug> + <bug>118875</bug> + <access>remote</access> + <affected> + <package name="www-servers/apache" auto="yes" arch="*"> + <unaffected range="ge">2.0.55-r1</unaffected> + <unaffected range="rge">2.0.54-r16</unaffected> + <unaffected range="eq">1.3.34-r2</unaffected> + <unaffected range="rge">1.3.34-r11</unaffected> + <unaffected range="rge">1.3.37</unaffected> + <vulnerable range="lt">2.0.55-r1</vulnerable> + </package> + </affected> + <background> + <p> + The Apache HTTP server is one of the most popular web servers on the + Internet. mod_imap provides support for server-side image maps; mod_ssl + provides secure HTTP connections. + </p> + </background> + <description> + <p> + Apache's mod_imap fails to properly sanitize the "Referer" directive of + imagemaps in some cases, leaving the HTTP Referer header unescaped. A + flaw in mod_ssl can lead to a NULL pointer dereference if the site uses + a custom "Error 400" document. These vulnerabilities were reported by + Marc Cox and Hartmut Keil, respectively. + </p> + </description> + <impact type="normal"> + <p> + A remote attacker could exploit mod_imap to inject arbitrary HTML or + JavaScript into a user's browser to gather sensitive information. + Attackers could also cause a Denial of Service on hosts using the SSL + module (Apache 2.0.x only). + </p> + </impact> + <workaround> + <p> + There is no known workaround at this time. + </p> + </workaround> + <resolution> + <p> + All Apache users should upgrade to the latest version, depending on + whether they still use the old configuration style + (/etc/apache/conf/*.conf) or the new one (/etc/apache2/httpd.conf). + </p> + <p> + 2.0.x users, new style config: + </p> + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/apache-2.0.55-r1"</code> + <p> + 2.0.x users, old style config: + </p> + <code> + # emerge --sync + # emerge --ask --oneshot --verbose "=www-servers/apache-2.0.54-r16"</code> + <p> + 1.x users, new style config: + </p> + <code> + # emerge --sync + # emerge --ask --oneshot --verbose "=www-servers/apache-1.3.34-r11"</code> + <p> + 1.x users, old style config: + </p> + <code> + # emerge --sync + # emerge --ask --oneshot --verbose "=www-servers/apache-1.3.34-r2"</code> + </resolution> + <references> + <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3352">CVE-2005-3352</uri> + <uri link="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3357">CVE-2005-3357</uri> + </references> + <metadata tag="requester" timestamp="Mon, 23 Jan 2006 08:56:54 +0000"> + koon + </metadata> + <metadata tag="submitter" timestamp="Fri, 27 Jan 2006 06:31:39 +0000"> + frilled + </metadata> + <metadata tag="bugReady" timestamp="Mon, 06 Feb 2006 06:26:14 +0000"> + jaervosz + </metadata> +</glsa> |