U radu programskog paketa Apache uočena su tri nova sigurnosna propusta. Zloćudni korisnik ih može iskoristiti za napad uskraćivanjem usluga (DoS) te neovlašteno slanje zahtjeva intranet poslužiteljima.
Paket:
Apache 2.x
Operacijski sustavi:
openSUSE 11.3, openSUSE 11.4
Kritičnost:
7
Problem:
pogreška u programskoj komponenti
Iskorištavanje:
udaljeno
Posljedica:
dobivanje većih privilegija, uskraćivanje usluga (DoS), zaobilaženje postavljenih ograničenja
Rješenje:
programska zakrpa proizvođača
CVE:
CVE-2011-3192, CVE-2011-3348, CVE-2011-3368
Izvorni ID preporuke:
openSUSE-SU-2011:1217-1
Izvor:
SUSE
Problem:
Sigurnosni propusti se javljaju zbog pogrešne implementacije programskih modula "mod_proxy_ajp" i "mod_proxy" te nepravilnosti u komponenti "byterange filter".
Posljedica:
Udaljeni napadač navedene ranjivosti može iskoristiti za zaobilaženje ograničenja, dobivanje većih ovlasti te za DoS (eng. Denial of Service) napad.
Rješenje:
Svim se korisnicima navedenog programskog paketa, u svrhu zaštite sigurnosti, savjetuje korištenje dostupnih nadogradnji i zakrpa.
openSUSE Security Update: apache2: Fixed several security issues
______________________________________________________________________________
Announcement ID: openSUSE-SU-2011:1217-1
Rating: important
References: #713966 #719236 #722545
Cross-References: CVE-2011-3192
Affected Products:
openSUSE 11.4
openSUSE 11.3
______________________________________________________________________________
An update that solves one vulnerability and has two fixes
is now available.
Description:
This update fixes several security issues in the Apache
webserver.
The patch for the ByteRange remote denial of service attack
(CVE-2011-3192) was refined and the configuration options
used by upstream were added. Introduce new config option:
Allow MaxRanges Number of ranges requested, if exceeded,
the complete content is served. default: 200 0|unlimited:
unlimited none: Range headers are ignored. This option is a
backport from 2.2.21.
Also fixed: CVE-2011-3348: Denial of service in proxy_ajp
when using a undefined method.
CVE-2011-3368: Exposure of internal servers via reverse
proxy methods with mod_proxy enabled and incorrect Rewrite
or Proxy Rules.
Patch Instructions:
To install this openSUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:
- openSUSE 11.4:
zypper in -t patch apache2-5347
- openSUSE 11.3:
zypper in -t patch apache2-5347
To bring your system up-to-date, use "zypper patch".
Package List:
- openSUSE 11.4 (i586 x86_64):
apache2-2.2.17-4.9.1
apache2-devel-2.2.17-4.9.1
apache2-example-certificates-2.2.17-4.9.1
apache2-example-pages-2.2.17-4.9.1
apache2-itk-2.2.17-4.9.1
apache2-prefork-2.2.17-4.9.1
apache2-utils-2.2.17-4.9.1
apache2-worker-2.2.17-4.9.1
- openSUSE 11.4 (noarch):
apache2-doc-2.2.17-4.9.1
- openSUSE 11.3 (i586 x86_64):
apache2-2.2.15-4.7.1
apache2-devel-2.2.15-4.7.1
apache2-example-certificates-2.2.15-4.7.1
apache2-example-pages-2.2.15-4.7.1
apache2-itk-2.2.15-4.7.1
apache2-prefork-2.2.15-4.7.1
apache2-utils-2.2.15-4.7.1
apache2-worker-2.2.15-4.7.1
- openSUSE 11.3 (noarch):
apache2-doc-2.2.15-4.7.1
References:
http://support.novell.com/security/cve/CVE-2011-3192.html
https://bugzilla.novell.com/713966
https://bugzilla.novell.com/719236
https://bugzilla.novell.com/722545
--
To unsubscribe, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
For additional commands, e-mail: Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
Posljednje sigurnosne preporuke