Otkrivena su dva propusta u paketu Apache HTTP Server koje udaljeni napadači mogu iskoristiti za izvođenje DoS (eng. Denial of Service) napada.
Paket:
Apache 2.x
Operacijski sustavi:
Fedora 15
Kritičnost:
7
Problem:
neodgovarajuće rukovanje memorijom, pogreška u programskoj komponenti
Iskorištavanje:
udaljeno
Posljedica:
uskraćivanje usluga (DoS)
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2011-3348, CVE-2011-3192
Izvorni ID preporuke:
FEDORA-2011-12715
Izvor:
Fedora
Problem:
Prvi propust se javlja zbog greške u "mod_proxy_ajp" kada se koristi zajedno s "mod_proxy_balancer". Drugi propust je posljedica nepravilnog rukovanja memorijom pri obradi Range zaglavlja.
Posljedica:
Oba propusta udaljeni napadač može iskoristiti za napad uskraćivanjem usluga (DoS napad) pomoću posebno oblikovanih HTTP zahtjeva.
Rješenje:
Korisnicima se savjetuje korištenje odgovarajuće nadogradnje.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-12715
2011-09-14 21:56:12
--------------------------------------------------------------------------------
Name : httpd
Product : Fedora 15
Version : 2.2.21
Release : 1.fc15
URL : http://httpd.apache.org/
Summary : Apache HTTP Server
Description :
The Apache HTTP Server is a powerful, efficient, and extensible
web server.
--------------------------------------------------------------------------------
Update Information:
This update includes the latest stable release of the Apache HTTP Server, version 2.2.21. Two security issues have been fixed:
mod_proxy_ajp when combined with mod_proxy_balancer: Prevents unrecognized HTTP methods from marking ajp: balancer members in an error state, avoiding denial of service. (CVE-2011-3348)
Fixes to the handling of byte-range requests to use less memory, to avoid denial of service. (CVE-2011-3192)
A number of bugs have been fixed as well. See:
http://www.apache.org/dist/httpd/CHANGES_2.2.21
http://www.apache.org/dist/httpd/CHANGES_2.2.20
--------------------------------------------------------------------------------
ChangeLog:
* Tue Sep 13 2011 Joe Orton <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.2.21-1
- update to 2.2.21
- restore authnoprov patch (#736104)
* Wed Aug 10 2011 Jan Kaluza <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.2.19-5
- fix #707917 - add httpd-ssl-pass-dialog to ask for SSL password using systemd
* Wed Jul 20 2011 Jan Kaluza <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.2.19-2
- fix #716621 - suexec now works without setuid bit
- fix #689091 - backported patch from 2.3 branch to support IPv6 in logresolve
* Tue Jul 19 2011 Joe Orton <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.2.19-1
- update to 2.2.19
* Wed Mar 23 2011 Joe Orton <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.2.17-11
- minor updates to httpd.conf
- drop old patches
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #736104 - httpd update broke PAM authentication
https://bugzilla.redhat.com/show_bug.cgi?id=736104
[ 2 ] Bug #733217 - CVE-2011-3192 httpd: multiple ranges DoS [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=733217
[ 3 ] Bug #707917 - please hook up SSL certificate password query with systemd by default
https://bugzilla.redhat.com/show_bug.cgi?id=707917
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update httpd' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke