Izdana je nadogradnja koja ispravlja kritični sigurnosni propust u radu programskog paketa httpd. Napadač može iskoristiti ranjivosti za napad uskraćivanjem usluga (DoS), otkrivanje osjetljivih podataka te dobivanje većih ovlasti.
Paket:
HTTPD 2.x
Operacijski sustavi:
Fedora 16
Kritičnost:
4
Problem:
cjelobrojno prepisivanje, pogreška u programskoj funkciji, pogreška u programskoj komponenti
Iskorištavanje:
lokalno/udaljeno
Posljedica:
dobivanje većih privilegija, otkrivanje osjetljivih informacija, uskraćivanje usluga (DoS)
Sigurnosni nedostaci se javljaju zbog pogrešaka u komponentama "mod_proxy" i "scoreboard.c", cjelobrojnog prepisivanja u funkciji "ap_pregsub", neodgovarajućeg rukovanja određenim podacima u "log_cookie", itd.
Posljedica:
Zloćudni korisnik spomenute propuste može iskoristiti za dobivanje većih ovlasti, otkrivanje osjetljivih informacija te DoS (eng. Denial of Service) napad.
Rješenje:
Svim se korisnicima savjetuje primjena izdane nadogradnje.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-1598
2012-02-14 08:16:21
--------------------------------------------------------------------------------
Name : httpd
Product : Fedora 16
Version : 2.2.22
Release : 1.fc16
URL : http://httpd.apache.org/
Summary : Apache HTTP Server
Description :
The Apache HTTP Server is a powerful, efficient, and extensible
web server.
--------------------------------------------------------------------------------
Update Information:
This update contains the latest stable release of the Apace HTTP Server, version
2.2.22. This release fixes various bugs, and the following security issues:
* Reject requests where the request-URI does not match the HTTP specification,
preventing unexpected expansion of target URLs in some reverse proxy
configurations. (CVE-2011-3368)
* Fix integer overflow in ap_pregsub() which, when the mod_setenvif module is
enabled, could allow local users to gain privileges via a .htaccess file.
(CVE-2011-3607)
* Resolve additional cases of URL rewriting with ProxyPassMatch or RewriteRule,
where particular request-URIs could result in undesired backend network exposure
in some configurations. (CVE-2011-4317)
* mod_log_config: Fix segfault (crash) when the '%{cookiename}C' log format
string is in use and a client sends a nameless, valueless cookie, causing a
denial of service. The issue existed since version 2.2.17. (CVE-2012-0021)
* Fix scoreboard issue which could allow an unprivileged child process could
cause the parent to crash at shutdown rather than terminate cleanly.
(CVE-2012-0031)
* Fixed an issue in error responses that could expose "httpOnly" cookies when no
custom ErrorDocument is specified for status code 400. (CVE-2012-0053)
http://www.apache.org/dist/httpd/CHANGES_2.2.22
--------------------------------------------------------------------------------
ChangeLog:
* Mon Feb 13 2012 Joe Orton <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.2.22-1
- update to 2.2.22
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #785070 - CVE-2011-3368 CVE-2012-0053 CVE-2012-0031 CVE-2012-0021
CVE-2011-3607 httpd: multiple vulnerabilities [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=785070
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update httpd' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke