Gentoo Archives: gentoo-announce

From: Pierre-Yves Rofes <py@g.o>
To: gentoo-announce@l.g.o
Cc: full-disclosure@××××××××××××××.uk, bugtraq@×××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200711-06 ] Apache: Multiple vulnerabilities
Date: Wed, 07 Nov 2007 19:45:18
Message-Id: 473212A0.30607@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5 Gentoo Linux Security Advisory GLSA 200711-06
6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7 http://security.gentoo.org/
8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9
10 Severity: Normal
11 Title: Apache: Multiple vulnerabilities
12 Date: November 07, 2007
13 Bugs: #186219
14 ID: 200711-06
15
16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
17
18 Synopsis
19 ========
20
21 Multiple vulnerabilities have been discovered in Apache, possibly
22 resulting in a Denial of Service or the disclosure of sensitive
23 information.
24
25 Background
26 ==========
27
28 The Apache HTTP server is one of the most popular web servers on the
29 Internet.
30
31 Affected packages
32 =================
33
34 -------------------------------------------------------------------
35 Package / Vulnerable / Unaffected
36 -------------------------------------------------------------------
37 1 www-servers/apache < 2.2.6 *>= 2.0.59-r5
38 >= 2.2.6
39
40 Description
41 ===========
42
43 Multiple cross-site scripting vulnerabilities have been discovered in
44 mod_status and mod_autoindex (CVE-2006-5752, CVE-2007-4465). An error
45 has been discovered in the recall_headers() function in mod_mem_cache
46 (CVE-2007-1862). The mod_cache module does not properly sanitize
47 requests before processing them (CVE-2007-1863). The Prefork module
48 does not properly check PID values before sending signals
49 (CVE-2007-3304). The mod_proxy module does not correctly check headers
50 before processing them (CVE-2007-3847).
51
52 Impact
53 ======
54
55 A remote attacker could exploit one of these vulnerabilities to inject
56 arbitrary script or HTML content, obtain sensitive information or cause
57 a Denial of Service.
58
59 Workaround
60 ==========
61
62 There is no known workaround at this time.
63
64 Resolution
65 ==========
66
67 All Apache users should upgrade to the latest version:
68
69 # emerge --sync
70 # emerge --ask --oneshot --verbose ">=www-servers/apache-2.0.59-r5"
71
72 References
73 ==========
74
75 [ 1 ] CVE-2006-5752
76 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752
77 [ 2 ] CVE-2007-1862
78 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1862
79 [ 3 ] CVE-2007-1863
80 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1863
81 [ 4 ] CVE-2007-3304
82 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3304
83 [ 5 ] CVE-2007-3847
84 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3847
85 [ 6 ] CVE-2007-4465
86 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4465
87
88 Availability
89 ============
90
91 This GLSA and any updates to it are available for viewing at
92 the Gentoo Security Website:
93
94 http://security.gentoo.org/glsa/glsa-200711-06.xml
95
96 Concerns?
97 =========
98
99 Security is a primary focus of Gentoo Linux and ensuring the
100 confidentiality and security of our users machines is of utmost
101 importance to us. Any security concerns should be addressed to
102 security@g.o or alternatively, you may file a bug at
103 http://bugs.gentoo.org.
104
105 License
106 =======
107
108 Copyright 2007 Gentoo Foundation, Inc; referenced text
109 belongs to its owner(s).
110
111 The contents of this document are licensed under the
112 Creative Commons - Attribution / Share Alike license.
113
114 http://creativecommons.org/licenses/by-sa/2.5
115 -----BEGIN PGP SIGNATURE-----
116 Version: GnuPG v1.4.7 (GNU/Linux)
117 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
118
119 iD8DBQFHMhKguhJ+ozIKI5gRAilbAJ4lvKMYl87wxBxHtrvhMz7db3yDEACeNQnV
120 UfU90XjcEHARQCFOy/+MtlY=
121 =ZTI0
122 -----END PGP SIGNATURE-----
123 --
124 gentoo-announce@g.o mailing list