====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat Application Stack v2.2 security and enhancement update
Advisory ID:       RHSA-2008:0966-02
Product:           Red Hat Application Stack
Advisory URL:      https://access.redhat.com/errata/RHSA-2008:0966.html
Issue date:        2008-12-04
CVE Names:         CVE-2007-6420 CVE-2008-2364 CVE-2008-2939 
====================================================================
1. Summary:

Red Hat Application Stack v2.2 is now available.  This update fixes several
security issues and adds various enhancements.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Application Stack v2 for Enterprise Linux (v.5) - i386, noarch, x86_64

3. Description:

The Red Hat Application Stack v2.2 is an integrated open source application
stack, that includes Red Hat Enterprise Linux 5 and JBoss Enterprise
Application Platform (EAP) 4.2.

This erratum updates the Apache HTTP Server package to version 2.0.10 which
addresses the following security issues:

A flaw was found in the mod_proxy module. An attacker who has control of
a web server to which requests are being proxied could cause a limited
denial of service due to CPU consumption and stack exhaustion. (CVE-2008-2364)

A flaw was found in the mod_proxy_ftp module. Where Apache is configured
to support ftp-over-httpd proxying, a remote attacker could perform a
cross-site scripting attack. (CVE-2008-2939)

A cross-site request forgery issue was found in the mod_proxy_balancer
module. A remote attacker could cause a denial of service if
mod_proxy_balancer is enabled and an authenticated user is targeted. 
(CVE-2007-6420)

The JBoss Enterprise Application Platform (EAP) 4.2 has been updated to
version 4.2.0.CP05. 

The following packages were also updated:

* mysql to 5.0.60sp1
* mysql-connector-odbc to 3.51.26r1127
* perl-DBI to 1.607
* perl-DBD-MySQL to 4.008
* perl-DBD-Pg to 1.49
* php-pear to 1.7.2
* postgresql to 8.2.11
* postgresqlclient81 to 8.1.11

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network.  Details on how to use
the Red Hat Network to apply this update are available at

5. Bugs fixed (http://bugzilla.redhat.com/):

451615 - CVE-2008-2364 httpd: mod_proxy_http DoS via excessive interim responses from the origin server
458250 - CVE-2008-2939 httpd: mod_proxy_ftp globbing XSS
471009 - CVE-2007-6420 mod_proxy_balancer CSRF

6. Package List:

Red Hat Application Stack v2 for Enterprise Linux (v.5):

Source:

i386:
httpd-2.2.10-1.el5s2.i386.rpm
httpd-debuginfo-2.2.10-1.el5s2.i386.rpm
httpd-devel-2.2.10-1.el5s2.i386.rpm
httpd-manual-2.2.10-1.el5s2.i386.rpm
mod_ssl-2.2.10-1.el5s2.i386.rpm
mysql-5.0.60sp1-1.el5s2.i386.rpm
mysql-bench-5.0.60sp1-1.el5s2.i386.rpm
mysql-cluster-5.0.60sp1-1.el5s2.i386.rpm
mysql-connector-odbc-3.51.26r1127-1.el5s2.i386.rpm
mysql-connector-odbc-debuginfo-3.51.26r1127-1.el5s2.i386.rpm
mysql-debuginfo-5.0.60sp1-1.el5s2.i386.rpm
mysql-devel-5.0.60sp1-1.el5s2.i386.rpm
mysql-libs-5.0.60sp1-1.el5s2.i386.rpm
mysql-server-5.0.60sp1-1.el5s2.i386.rpm
mysql-test-5.0.60sp1-1.el5s2.i386.rpm
perl-DBD-MySQL-4.008-2.el5s2.i386.rpm
perl-DBD-MySQL-debuginfo-4.008-2.el5s2.i386.rpm
perl-DBD-Pg-1.49-4.el5s2.i386.rpm
perl-DBD-Pg-debuginfo-1.49-4.el5s2.i386.rpm
perl-DBI-1.607-3.el5s2.i386.rpm
perl-DBI-debuginfo-1.607-3.el5s2.i386.rpm
postgresql-8.2.11-1.el5s2.i386.rpm
postgresql-contrib-8.2.11-1.el5s2.i386.rpm
postgresql-debuginfo-8.2.11-1.el5s2.i386.rpm
postgresql-devel-8.2.11-1.el5s2.i386.rpm
postgresql-docs-8.2.11-1.el5s2.i386.rpm
postgresql-libs-8.2.11-1.el5s2.i386.rpm
postgresql-plperl-8.2.11-1.el5s2.i386.rpm
postgresql-plpython-8.2.11-1.el5s2.i386.rpm
postgresql-pltcl-8.2.11-1.el5s2.i386.rpm
postgresql-python-8.2.11-1.el5s2.i386.rpm
postgresql-server-8.2.11-1.el5s2.i386.rpm
postgresql-tcl-8.2.11-1.el5s2.i386.rpm
postgresql-test-8.2.11-1.el5s2.i386.rpm
postgresqlclient81-8.1.14-1.el5s2.i386.rpm
postgresqlclient81-debuginfo-8.1.14-1.el5s2.i386.rpm

noarch:
php-pear-1.7.2-2.el5s2.noarch.rpm

x86_64:
httpd-2.2.10-1.el5s2.x86_64.rpm
httpd-debuginfo-2.2.10-1.el5s2.x86_64.rpm
httpd-devel-2.2.10-1.el5s2.x86_64.rpm
httpd-manual-2.2.10-1.el5s2.x86_64.rpm
mod_ssl-2.2.10-1.el5s2.x86_64.rpm
mysql-5.0.60sp1-1.el5s2.x86_64.rpm
mysql-bench-5.0.60sp1-1.el5s2.x86_64.rpm
mysql-cluster-5.0.60sp1-1.el5s2.x86_64.rpm
mysql-connector-odbc-3.51.26r1127-1.el5s2.x86_64.rpm
mysql-connector-odbc-debuginfo-3.51.26r1127-1.el5s2.x86_64.rpm
mysql-debuginfo-5.0.60sp1-1.el5s2.x86_64.rpm
mysql-devel-5.0.60sp1-1.el5s2.x86_64.rpm
mysql-libs-5.0.60sp1-1.el5s2.x86_64.rpm
mysql-server-5.0.60sp1-1.el5s2.x86_64.rpm
mysql-test-5.0.60sp1-1.el5s2.x86_64.rpm
perl-DBD-MySQL-4.008-2.el5s2.x86_64.rpm
perl-DBD-MySQL-debuginfo-4.008-2.el5s2.x86_64.rpm
perl-DBD-Pg-1.49-4.el5s2.x86_64.rpm
perl-DBD-Pg-debuginfo-1.49-4.el5s2.x86_64.rpm
perl-DBI-1.607-3.el5s2.x86_64.rpm
perl-DBI-debuginfo-1.607-3.el5s2.x86_64.rpm
postgresql-8.2.11-1.el5s2.x86_64.rpm
postgresql-contrib-8.2.11-1.el5s2.x86_64.rpm
postgresql-debuginfo-8.2.11-1.el5s2.i386.rpm
postgresql-debuginfo-8.2.11-1.el5s2.x86_64.rpm
postgresql-devel-8.2.11-1.el5s2.i386.rpm
postgresql-devel-8.2.11-1.el5s2.x86_64.rpm
postgresql-docs-8.2.11-1.el5s2.x86_64.rpm
postgresql-libs-8.2.11-1.el5s2.i386.rpm
postgresql-libs-8.2.11-1.el5s2.x86_64.rpm
postgresql-plperl-8.2.11-1.el5s2.x86_64.rpm
postgresql-plpython-8.2.11-1.el5s2.x86_64.rpm
postgresql-pltcl-8.2.11-1.el5s2.x86_64.rpm
postgresql-python-8.2.11-1.el5s2.x86_64.rpm
postgresql-server-8.2.11-1.el5s2.x86_64.rpm
postgresql-tcl-8.2.11-1.el5s2.x86_64.rpm
postgresql-test-8.2.11-1.el5s2.x86_64.rpm
postgresqlclient81-8.1.14-1.el5s2.x86_64.rpm
postgresqlclient81-debuginfo-8.1.14-1.el5s2.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6420
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939
http://www.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is .  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2008 Red Hat, Inc.

RedHat: Moderate: Red Hat Application Stack v2.2

Red Hat Application Stack v2.2 is now available

Summary

The Red Hat Application Stack v2.2 is an integrated open source application stack, that includes Red Hat Enterprise Linux 5 and JBoss Enterprise Application Platform (EAP) 4.2.
This erratum updates the Apache HTTP Server package to version 2.0.10 which addresses the following security issues:
A flaw was found in the mod_proxy module. An attacker who has control of a web server to which requests are being proxied could cause a limited denial of service due to CPU consumption and stack exhaustion. (CVE-2008-2364)
A flaw was found in the mod_proxy_ftp module. Where Apache is configured to support ftp-over-httpd proxying, a remote attacker could perform a cross-site scripting attack. (CVE-2008-2939)
A cross-site request forgery issue was found in the mod_proxy_balancer module. A remote attacker could cause a denial of service if mod_proxy_balancer is enabled and an authenticated user is targeted. (CVE-2007-6420)
The JBoss Enterprise Application Platform (EAP) 4.2 has been updated to version 4.2.0.CP05.
The following packages were also updated:
* mysql to 5.0.60sp1 * mysql-connector-odbc to 3.51.26r1127 * perl-DBI to 1.607 * perl-DBD-MySQL to 4.008 * perl-DBD-Pg to 1.49 * php-pear to 1.7.2 * postgresql to 8.2.11 * postgresqlclient81 to 8.1.11



Summary


Solution

Before applying this update, make sure that all previously-released errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6420 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939 http://www.redhat.com/security/updates/classification/#moderate

Package List

Red Hat Application Stack v2 for Enterprise Linux (v.5):
Source:
i386: httpd-2.2.10-1.el5s2.i386.rpm httpd-debuginfo-2.2.10-1.el5s2.i386.rpm httpd-devel-2.2.10-1.el5s2.i386.rpm httpd-manual-2.2.10-1.el5s2.i386.rpm mod_ssl-2.2.10-1.el5s2.i386.rpm mysql-5.0.60sp1-1.el5s2.i386.rpm mysql-bench-5.0.60sp1-1.el5s2.i386.rpm mysql-cluster-5.0.60sp1-1.el5s2.i386.rpm mysql-connector-odbc-3.51.26r1127-1.el5s2.i386.rpm mysql-connector-odbc-debuginfo-3.51.26r1127-1.el5s2.i386.rpm mysql-debuginfo-5.0.60sp1-1.el5s2.i386.rpm mysql-devel-5.0.60sp1-1.el5s2.i386.rpm mysql-libs-5.0.60sp1-1.el5s2.i386.rpm mysql-server-5.0.60sp1-1.el5s2.i386.rpm mysql-test-5.0.60sp1-1.el5s2.i386.rpm perl-DBD-MySQL-4.008-2.el5s2.i386.rpm perl-DBD-MySQL-debuginfo-4.008-2.el5s2.i386.rpm perl-DBD-Pg-1.49-4.el5s2.i386.rpm perl-DBD-Pg-debuginfo-1.49-4.el5s2.i386.rpm perl-DBI-1.607-3.el5s2.i386.rpm perl-DBI-debuginfo-1.607-3.el5s2.i386.rpm postgresql-8.2.11-1.el5s2.i386.rpm postgresql-contrib-8.2.11-1.el5s2.i386.rpm postgresql-debuginfo-8.2.11-1.el5s2.i386.rpm postgresql-devel-8.2.11-1.el5s2.i386.rpm postgresql-docs-8.2.11-1.el5s2.i386.rpm postgresql-libs-8.2.11-1.el5s2.i386.rpm postgresql-plperl-8.2.11-1.el5s2.i386.rpm postgresql-plpython-8.2.11-1.el5s2.i386.rpm postgresql-pltcl-8.2.11-1.el5s2.i386.rpm postgresql-python-8.2.11-1.el5s2.i386.rpm postgresql-server-8.2.11-1.el5s2.i386.rpm postgresql-tcl-8.2.11-1.el5s2.i386.rpm postgresql-test-8.2.11-1.el5s2.i386.rpm postgresqlclient81-8.1.14-1.el5s2.i386.rpm postgresqlclient81-debuginfo-8.1.14-1.el5s2.i386.rpm
noarch: php-pear-1.7.2-2.el5s2.noarch.rpm
x86_64: httpd-2.2.10-1.el5s2.x86_64.rpm httpd-debuginfo-2.2.10-1.el5s2.x86_64.rpm httpd-devel-2.2.10-1.el5s2.x86_64.rpm httpd-manual-2.2.10-1.el5s2.x86_64.rpm mod_ssl-2.2.10-1.el5s2.x86_64.rpm mysql-5.0.60sp1-1.el5s2.x86_64.rpm mysql-bench-5.0.60sp1-1.el5s2.x86_64.rpm mysql-cluster-5.0.60sp1-1.el5s2.x86_64.rpm mysql-connector-odbc-3.51.26r1127-1.el5s2.x86_64.rpm mysql-connector-odbc-debuginfo-3.51.26r1127-1.el5s2.x86_64.rpm mysql-debuginfo-5.0.60sp1-1.el5s2.x86_64.rpm mysql-devel-5.0.60sp1-1.el5s2.x86_64.rpm mysql-libs-5.0.60sp1-1.el5s2.x86_64.rpm mysql-server-5.0.60sp1-1.el5s2.x86_64.rpm mysql-test-5.0.60sp1-1.el5s2.x86_64.rpm perl-DBD-MySQL-4.008-2.el5s2.x86_64.rpm perl-DBD-MySQL-debuginfo-4.008-2.el5s2.x86_64.rpm perl-DBD-Pg-1.49-4.el5s2.x86_64.rpm perl-DBD-Pg-debuginfo-1.49-4.el5s2.x86_64.rpm perl-DBI-1.607-3.el5s2.x86_64.rpm perl-DBI-debuginfo-1.607-3.el5s2.x86_64.rpm postgresql-8.2.11-1.el5s2.x86_64.rpm postgresql-contrib-8.2.11-1.el5s2.x86_64.rpm postgresql-debuginfo-8.2.11-1.el5s2.i386.rpm postgresql-debuginfo-8.2.11-1.el5s2.x86_64.rpm postgresql-devel-8.2.11-1.el5s2.i386.rpm postgresql-devel-8.2.11-1.el5s2.x86_64.rpm postgresql-docs-8.2.11-1.el5s2.x86_64.rpm postgresql-libs-8.2.11-1.el5s2.i386.rpm postgresql-libs-8.2.11-1.el5s2.x86_64.rpm postgresql-plperl-8.2.11-1.el5s2.x86_64.rpm postgresql-plpython-8.2.11-1.el5s2.x86_64.rpm postgresql-pltcl-8.2.11-1.el5s2.x86_64.rpm postgresql-python-8.2.11-1.el5s2.x86_64.rpm postgresql-server-8.2.11-1.el5s2.x86_64.rpm postgresql-tcl-8.2.11-1.el5s2.x86_64.rpm postgresql-test-8.2.11-1.el5s2.x86_64.rpm postgresqlclient81-8.1.14-1.el5s2.x86_64.rpm postgresqlclient81-debuginfo-8.1.14-1.el5s2.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key/#package


Severity
Advisory ID: RHSA-2008:0966-02
Product: Red Hat Application Stack
Advisory URL: https://access.redhat.com/errata/RHSA-2008:0966.html
Issued Date: : 2008-12-04
CVE Names: CVE-2007-6420 CVE-2008-2364 CVE-2008-2939

Topic

Red Hat Application Stack v2.2 is now available. This update fixes several security issues and adds various enhancements.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.


Topic


 

Relevant Releases Architectures

Red Hat Application Stack v2 for Enterprise Linux (v.5) - i386, noarch, x86_64


Bugs Fixed

451615 - CVE-2008-2364 httpd: mod_proxy_http DoS via excessive interim responses from the origin server

458250 - CVE-2008-2939 httpd: mod_proxy_ftp globbing XSS

471009 - CVE-2007-6420 mod_proxy_balancer CSRF


Related News