U radu programskog paketa HTTPD, namijenjenog operacijskom sustavu Fedora 15, uočeno je više sigurnosnih nedostataka. Napadač ih može iskoristiti za izvođenje DoS napada, pregled određenih podataka, stjecanje većih ovlasti i slanje zahtjeva intranet poslužiteljima.
Paket:
HTTPD 2.x
Operacijski sustavi:
Fedora 15
Kritičnost:
4
Problem:
cjelobrojno prepisivanje, neodgovarajuće rukovanje datotekama, pogreška u programskoj funkciji, pogreška u programskoj komponenti
Iskorištavanje:
lokalno/udaljeno
Posljedica:
dobivanje većih privilegija, otkrivanje osjetljivih informacija, uskraćivanje usluga (DoS)
Nedostaci su posljedica nepravilnosti u modulu "mod_proxy", cjelobrojnog prepisivanja u funkciji "ap_pregsub", te pogrešaka u funkciji "log_cookie" te datotekama "scoreboard.c" i "protocol.c".
Posljedica:
Napadaču omogućuju izvođenje DoS napada, otkrivanje osjetljivih informacija, stjecanje većih ovlasti i slanje zahtjeva intranet poslužiteljima.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-1642
2012-02-14 08:18:32
--------------------------------------------------------------------------------
Name : httpd
Product : Fedora 15
Version : 2.2.22
Release : 1.fc15
URL : http://httpd.apache.org/
Summary : Apache HTTP Server
Description :
The Apache HTTP Server is a powerful, efficient, and extensible
web server.
--------------------------------------------------------------------------------
Update Information:
This update contains the latest stable release of the Apace HTTP Server, version
2.2.22. This release fixes various bugs, and the following security issues:
* Reject requests where the request-URI does not match the HTTP specification,
preventing unexpected expansion of target URLs in some reverse proxy
configurations. (CVE-2011-3368)
* Fix integer overflow in ap_pregsub() which, when the mod_setenvif module is
enabled, could allow local users to gain privileges via a .htaccess file.
(CVE-2011-3607)
* Resolve additional cases of URL rewriting with ProxyPassMatch or RewriteRule,
where particular request-URIs could result in undesired backend network exposure
in some configurations. (CVE-2011-4317)
* mod_log_config: Fix segfault (crash) when the '%{cookiename}C' log format
string is in use and a client sends a nameless, valueless cookie, causing a
denial of service. The issue existed since version 2.2.17. (CVE-2012-0021)
* Fix scoreboard issue which could allow an unprivileged child process could
cause the parent to crash at shutdown rather than terminate cleanly.
(CVE-2012-0031)
* Fixed an issue in error responses that could expose "httpOnly" cookies when no
custom ErrorDocument is specified for status code 400. (CVE-2012-0053)
http://www.apache.org/dist/httpd/CHANGES_2.2.22
--------------------------------------------------------------------------------
ChangeLog:
* Mon Feb 13 2012 Joe Orton <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.2.22-1
- update to 2.2.22
* Tue Sep 13 2011 Joe Orton <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.2.21-1
- update to 2.2.21
- restore authnoprov patch (#736104)
* Wed Aug 10 2011 Jan Kaluza <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.2.19-5
- fix #707917 - add httpd-ssl-pass-dialog to ask for SSL password using systemd
* Wed Jul 20 2011 Jan Kaluza <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.2.19-2
- fix #716621 - suexec now works without setuid bit
- fix #689091 - backported patch from 2.3 branch to support IPv6 in logresolve
* Tue Jul 19 2011 Joe Orton <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.2.19-1
- update to 2.2.19
* Wed Mar 23 2011 Joe Orton <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.2.17-11
- minor updates to httpd.conf
- drop old patches
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #785070 - CVE-2011-3368 CVE-2012-0053 CVE-2012-0031 CVE-2012-0021
CVE-2011-3607 httpd: multiple vulnerabilities [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=785070
[ 2 ] Bug #787325 - Update httpd to 2.2.22 as CVE-2011-3368, CVE-2011-3607,
CVE-2011-4317, CVE-2012-0021, CVE-2012-0031, CVE-2012-0053 as well as bugfixes
https://bugzilla.redhat.com/show_bug.cgi?id=787325
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update httpd' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke