Jump to content

Advisories MDVSA-2009:124-1: apache


paul
 Share

Recommended Posts

Multiple vulnerabilities has been found and corrected in apache:

 

Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c

in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to

cause a denial of service (memory consumption) via multiple calls, as

demonstrated by initial SSL client handshakes to the Apache HTTP Server

mod_ssl that specify a compression algorithm (CVE-2008-1678). Note

that this security issue does not really apply as zlib compression

is not enabled in the openssl build provided by Mandriva, but apache

is patched to address this issue anyway (conserns 2008.1 only).

 

Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the

mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c

in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions,

allows remote attackers to inject arbitrary web script or HTML via

wildcards in a pathname in an FTP URI (CVE-2008-2939). Note that this

security issue was initially addressed with MDVSA-2008:195 but the

patch fixing the issue was added but not applied in 2009.0.

 

The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not

properly handle Options=IncludesNOEXEC in the AllowOverride directive,

which allows local users to gain privileges by configuring (1) Options

Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a

.htaccess file, and then inserting an exec element in a .shtml file

(CVE-2009-1195).

 

This update provides fixes for these vulnerabilities.

 

Update:

 

The patch for fixing CVE-2009-1195 for Mandriva Linux 2008.1 was

incomplete, this update addresses the problem.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

×
×
  • Create New...