LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: July 18th, 2014
Linux Advisory Watch: July 13th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Fedora Core 5 Update: httpd-2.2.2-1.3 Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Fedora The Apache HTTP Server did not verify that a process was an Apache child process before sending it signals. A local attacker with the ability to run scripts on the Apache HTTP Server could manipulate the scoreboard and cause arbitrary processes to be terminated which could lead to a denial of service (CVE-2007-3304).
---------------------------------------------------------------------
Fedora Update Notification
FEDORA-2007-617
2007-07-02
---------------------------------------------------------------------

Product     : Fedora Core 5
Name        : httpd
Version     : 2.2.2
Release     : 1.3
Summary     : Apache HTTP Server
Description :
The Apache HTTP Server is a powerful, efficient, and extensible
web server.

---------------------------------------------------------------------
Update Information:

The Apache HTTP Server did not verify that a process was an
Apache child process before sending it signals. A local
attacker with the ability to run scripts on the Apache HTTP
Server could manipulate the scoreboard and cause arbitrary
processes to be terminated which could lead to a denial of
service (CVE-2007-3304). This issue is not exploitable on
Fedora if using the default SELinux targeted policy.

A flaw was found in the Apache HTTP Server mod_status
module. On sites where the server-status page is publicly
accessible and ExtendedStatus is enabled this could lead to
a cross-site scripting attack. On Fedora the server-status
page is not enabled by default and it is best practice to
not make this publicly available. (CVE-2006-5752)

A bug was found in the Apache HTTP Server mod_cache module.
On sites where caching is enabled, a remote attacker could
send a carefully crafted request that would cause the Apache
child process handling that request to crash. This could
lead to a denial of service if using a threaded
Multi-Processing Module. (CVE-2007-1863)

---------------------------------------------------------------------
* Tue Jun 26 2007 Joe Orton  2.2.2-1.3
- add security fixes for CVE-2006-5752, CVE-2007-1863 and
  CVE-2007-3304 (#244660)
* Wed Jul 26 2006 Joe Orton  2.2.2-1.2
- add mod_rewrite security fix (CVE-2006-3747)
* Wed Jul 19 2006 Joe Orton  2.2.2-1.1
- fix segfault on dummy connection failure at graceful restart (#199429)
* Thu May 11 2006 Joe Orton  2.2.2-1.0
- update to 2.2.2
* Thu Apr  6 2006 Joe Orton  2.2.0-5.2
- fix LDAP issues on 64-bit platforms (#188073)

---------------------------------------------------------------------
This update can be downloaded from:
    http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/

e6b405078d61866b253996c01dd6d2a665d03f16  SRPMS/httpd-2.2.2-1.3.src.rpm
e6b405078d61866b253996c01dd6d2a665d03f16  noarch/httpd-2.2.2-1.3.src.rpm
2da7ae8b7154edd1c29b38e3e4fd00d81be6f630  ppc/httpd-2.2.2-1.3.ppc.rpm
62804f3fe97fdfd71f9dcde7f7c40800b91df202  ppc/mod_ssl-2.2.2-1.3.ppc.rpm
01891fbb3306fc6412780032f448cd9f28fc79f2  ppc/httpd-manual-2.2.2-1.3.ppc.rpm
4bf976824e0b4f90084c16dbf5f6d4d923fa4f7d  ppc/httpd-devel-2.2.2-1.3.ppc.rpm
273e782b60cfbccf3de7f1538c37a26a82d570d3  ppc/debug/httpd-debuginfo-2.2.2-1.3.ppc.rpm
9a539f3dad1f404318846dd1b7323bf092e249dd  x86_64/httpd-devel-2.2.2-1.3.x86_64.rpm
940d606295b6105d613193fd7c4d61fe570839c0  x86_64/debug/httpd-debuginfo-2.2.2-1.3.x86_64.rpm
6e81a89d11d9e2a40f9e81fc208b0da18dff98d4  x86_64/mod_ssl-2.2.2-1.3.x86_64.rpm
03dd6c692195b23ea06e5d547b8c110e80f337d9  x86_64/httpd-manual-2.2.2-1.3.x86_64.rpm
870e9a7132a66f522e1591d838e755a133810bca  x86_64/httpd-2.2.2-1.3.x86_64.rpm
7ac8528edd458749edf22723fd464f3753a43cc2  i386/httpd-manual-2.2.2-1.3.i386.rpm
93d9f497f51185c2d8807f10bad7bcf4d79bad0e  i386/httpd-2.2.2-1.3.i386.rpm
8b932638ad7c828cf728ddfab432420a8f73545a  i386/debug/httpd-debuginfo-2.2.2-1.3.i386.rpm
9c19dd3c181a74d0ee3424421e539dc320dbe1b7  i386/httpd-devel-2.2.2-1.3.i386.rpm
467f4e8b50318ab8d97d857df53cd6a3cda6cd92  i386/mod_ssl-2.2.2-1.3.i386.rpm

This update can be installed with the 'yum' update program.  Use 'yum update
package-name' at the command line.  For more information, refer to 'Managing
Software with yum,' available at http://fedora.redhat.com/docs/yum/.
---------------------------------------------------------------------

_______________________________________________
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Anti-surveillance advocates want you to run an open, secure WiFi router
Attackers raid SWISS BANKS with DNS and malware bombs
A Convicted Hacker and an Internet Icon Join Forces to Thwart NSA Spying
Black Hat presentation on TOR suddenly cancelled
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.