Gentoo Archives: gentoo-announce

From: Pierre-Yves Rofes <py@g.o>
To: gentoo-announce@l.g.o
Cc: full-disclosure@××××××××××××××.uk, bugtraq@×××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200803-19 ] Apache: Multiple vulnerabilities
Date: Tue, 11 Mar 2008 21:44:40
Message-Id: 47D709F2.9000606@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5 Gentoo Linux Security Advisory GLSA 200803-19
6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7 http://security.gentoo.org/
8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9
10 Severity: Normal
11 Title: Apache: Multiple vulnerabilities
12 Date: March 11, 2008
13 Bugs: #201163, #204410, #205195, #209899
14 ID: 200803-19
15
16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
17
18 Synopsis
19 ========
20
21 Multiple vulnerabilities have been discovered in Apache.
22
23 Background
24 ==========
25
26 The Apache HTTP server is one of the most popular web servers on the
27 Internet.
28
29 Affected packages
30 =================
31
32 -------------------------------------------------------------------
33 Package / Vulnerable / Unaffected
34 -------------------------------------------------------------------
35 1 www-servers/apache < 2.2.8 >= 2.2.8
36
37 Description
38 ===========
39
40 Adrian Pastor and Amir Azam (ProCheckUp) reported that the HTTP Method
41 specifier header is not properly sanitized when the HTTP return code is
42 "413 Request Entity too large" (CVE-2007-6203). The mod_proxy_balancer
43 module does not properly check the balancer name before using it
44 (CVE-2007-6422). The mod_proxy_ftp does not define a charset in its
45 answers (CVE-2008-0005). Stefano Di Paola (Minded Security) reported
46 that filenames are not properly sanitized within the mod_negociation
47 module (CVE-2008-0455, CVE-2008-0456).
48
49 Impact
50 ======
51
52 A remote attacker could entice a user to visit a malicious URL or send
53 specially crafted HTTP requests (i.e using Adobe Flash) to perform
54 Cross-Site Scripting and HTTP response splitting attacks, or conduct a
55 Denial of Service attack on the vulnerable web server.
56
57 Workaround
58 ==========
59
60 There is no known workaround at this time.
61
62 Resolution
63 ==========
64
65 All Apache users should upgrade to the latest version:
66
67 # emerge --sync
68 # emerge --ask --oneshot --verbose ">=www-servers/apache-2.2.8"
69
70 References
71 ==========
72
73 [ 1 ] CVE-2007-6203
74 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6203
75 [ 2 ] CVE-2007-6422
76 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6422
77 [ 3 ] CVE-2008-0005
78 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0005
79 [ 4 ] CVE-2008-0455
80 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0455
81 [ 5 ] CVE-2008-0456
82 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0456
83
84 Availability
85 ============
86
87 This GLSA and any updates to it are available for viewing at
88 the Gentoo Security Website:
89
90 http://security.gentoo.org/glsa/glsa-200803-19.xml
91
92 Concerns?
93 =========
94
95 Security is a primary focus of Gentoo Linux and ensuring the
96 confidentiality and security of our users machines is of utmost
97 importance to us. Any security concerns should be addressed to
98 security@g.o or alternatively, you may file a bug at
99 http://bugs.gentoo.org.
100
101 License
102 =======
103
104 Copyright 2008 Gentoo Foundation, Inc; referenced text
105 belongs to its owner(s).
106
107 The contents of this document are licensed under the
108 Creative Commons - Attribution / Share Alike license.
109
110 http://creativecommons.org/licenses/by-sa/2.5
111 -----BEGIN PGP SIGNATURE-----
112 Version: GnuPG v2.0.7 (GNU/Linux)
113 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
114
115 iD8DBQFH1wnxuhJ+ozIKI5gRAjqTAJ4zeAHvPbQ2UWBwcVCSxEOV+qOATgCdFdD6
116 YlRviYEMv15dkIMA5mCW9/Q=
117 =f/5N
118 -----END PGP SIGNATURE-----
119 --
120 gentoo-announce@l.g.o mailing list