Jump to content

Security Advisory (MDKSA-2003:050): apache2


aru
 Share

Recommended Posts

MandrakeSoft Security Advisory MDKSA-2003:050 : apache2

 

April 22nd, 2003

Updated apache packages fix denial of service vulnerabilities

 

A memory leak was discovered in Apache 2.0 through 2.0.44 that can allow a remote attacker to cause a significant denial of service (DoS) by sending requests containing a lot of linefeed characters to the server.

 

As well, Apache does not filter terminal escape sequences from its log files, which could make it easy for an attacker to insert those sequences into the error and access logs, which could possibly be viewed by certain terminal emulators with vulnerabilities related to escape sequences.

 

After upgrading these packages, be sure to restart the httpd server by executing:

 

service httpd restart

 

 

The released versions of Mandrake GNU/Linux affected are:

  • 9.1

 

[*] 9.1/PPC

Full information about this advisory, including the updated packages, is available at:

www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:050

 

Other references:

http://cve.mitre.org/cgi-bin/cvename.cgi?n...e=CAN-2003-0020

http://cve.mitre.org/cgi-bin/cvename.cgi?n...e=CAN-2003-0083

http://cve.mitre.org/cgi-bin/cvename.cgi?n...e=CAN-2003-0132

 

Posted automatically by aru (mdksec2mub v0.0.5)

Link to comment
Share on other sites

 Share

×
×
  • Create New...