Date:         Wed, 16 Jan 2008 14:41:47 -0600
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      Security ERRATA for httpd on SL3.x, SL4.x, SL5,x i386/x86_64
Comments: To: "scientific-linux-errata@fnal.gov"
          

Synopsis:	Moderate: httpd security update
Issue date:	2008-01-15
CVE Names:	CVE-2007-3847 CVE-2007-4465 CVE-2007-5000
                 CVE-2007-6388 CVE-2007-6421 CVE-2007-6422
                 CVE-2008-0005

A flaw was found in the mod_proxy module. On sites where a reverse proxy is
configured, a remote attacker could send a carefully crafted request that
would cause the Apache child process handling that request to crash. On
sites where a forward proxy is configured, an attacker could cause a
similar crash if a user could be persuaded to visit a malicious site using
the proxy. This could lead to a denial of service if using a threaded
Multi-Processing Module. (CVE-2007-3847)

A flaw was found in the mod_autoindex module. On sites where directory
listings are used, and the "AddDefaultCharset" directive has been removed
from the configuration, a cross-site scripting attack might have been
possible against Web browsers which do not correctly derive the response
character set following the rules in RFC 2616. (CVE-2007-4465)

A flaw was found in the mod_imagemap module. On sites where mod_imagemap
was enabled and an imagemap file was publicly available, a cross-site
scripting attack was possible. (CVE-2007-5000)

A flaw was found in the mod_status module. On sites where mod_status was
enabled and the status pages were publicly available, a cross-site
scripting attack was possible. (CVE-2007-6388)

A flaw was found in the mod_proxy_balancer module. On sites where
mod_proxy_balancer was enabled, a cross-site scripting attack against an
authorized user was possible. (CVE-2007-6421)

A flaw was found in the mod_proxy_balancer module. On sites where
mod_proxy_balancer was enabled, an authorized user could send a carefully
crafted request that would cause the Apache child process handling that
request to crash. This could lead to a denial of service if using a
threaded Multi-Processing Module. (CVE-2007-6422)

A flaw was found in the mod_proxy_ftp module. On sites where mod_proxy_ftp
was enabled and a forward proxy was configured, a cross-site scripting
attack was possible against Web browsers which do not correctly derive the
response character set following the rules in RFC 2616. (CVE-2008-0005)

SL 3.0.x

     SRPMS:
httpd-2.0.46-70.sl3.src.rpm
     i386:
httpd-2.0.46-70.sl3.i386.rpm
httpd-devel-2.0.46-70.sl3.i386.rpm
mod_ssl-2.0.46-70.sl3.i386.rpm
     x86_64:
httpd-2.0.46-70.sl3.x86_64.rpm
httpd-devel-2.0.46-70.sl3.x86_64.rpm
mod_ssl-2.0.46-70.sl3.x86_64.rpm

SL 4.x

     SRPMS:
httpd-2.0.52-38.sl4.2.src.rpm
     i386:
httpd-2.0.52-38.sl4.2.i386.rpm
httpd-devel-2.0.52-38.sl4.2.i386.rpm
httpd-manual-2.0.52-38.sl4.2.i386.rpm
httpd-suexec-2.0.52-38.sl4.2.i386.rpm
mod_ssl-2.0.52-38.sl4.2.i386.rpm
     x86_64:
httpd-2.0.52-38.sl4.2.x86_64.rpm
httpd-devel-2.0.52-38.sl4.2.x86_64.rpm
httpd-manual-2.0.52-38.sl4.2.x86_64.rpm
httpd-suexec-2.0.52-38.sl4.2.x86_64.rpm
mod_ssl-2.0.52-38.sl4.2.x86_64.rpm


SL 5.x

     SRPMS:
httpd-2.2.3-11.sl5.3.src.rpm
     i386:
httpd-2.2.3-11.sl5.3.i386.rpm
httpd-devel-2.2.3-11.sl5.3.i386.rpm
httpd-manual-2.2.3-11.sl5.3.i386.rpm
mod_ssl-2.2.3-11.sl5.3.i386.rpm
     x86_64:
httpd-2.2.3-11.sl5.3.x86_64.rpm
httpd-devel-2.2.3-11.sl5.3.i386.rpm
httpd-devel-2.2.3-11.sl5.3.x86_64.rpm
httpd-manual-2.2.3-11.sl5.3.x86_64.rpm
mod_ssl-2.2.3-11.sl5.3.x86_64.rpm

-Connie Sieh
-Troy Dawson

SciLinux: CVE-2007-3847 httpd SL3.x, SL4.x, SL5,x i386/x86_64

Moderate: httpd security update

Summary

Date:         Wed, 16 Jan 2008 14:41:47 -0600Reply-To:     Troy Dawson Sender:       Security Errata for Scientific Linux              From:         Troy Dawson Subject:      Security ERRATA for httpd on SL3.x, SL4.x, SL5,x i386/x86_64Comments: To: "scientific-linux-errata@fnal.gov"          Synopsis:	Moderate: httpd security updateIssue date:	2008-01-15CVE Names:	CVE-2007-3847 CVE-2007-4465 CVE-2007-5000                 CVE-2007-6388 CVE-2007-6421 CVE-2007-6422                 CVE-2008-0005A flaw was found in the mod_proxy module. On sites where a reverse proxy isconfigured, a remote attacker could send a carefully crafted request thatwould cause the Apache child process handling that request to crash. Onsites where a forward proxy is configured, an attacker could cause asimilar crash if a user could be persuaded to visit a malicious site usingthe proxy. This could lead to a denial of service if using a threadedMulti-Processing Module. (CVE-2007-3847)A flaw was found in the mod_autoindex module. On sites where directorylistings are used, and the "AddDefaultCharset" directive has been removedfrom the configuration, a cross-site scripting attack might have beenpossible against Web browsers which do not correctly derive the responsecharacter set following the rules in RFC 2616. (CVE-2007-4465)A flaw was found in the mod_imagemap module. On sites where mod_imagemapwas enabled and an imagemap file was publicly available, a cross-sitescripting attack was possible. (CVE-2007-5000)A flaw was found in the mod_status module. On sites where mod_status wasenabled and the status pages were publicly available, a cross-sitescripting attack was possible. (CVE-2007-6388)A flaw was found in the mod_proxy_balancer module. On sites wheremod_proxy_balancer was enabled, a cross-site scripting attack against anauthorized user was possible. (CVE-2007-6421)A flaw was found in the mod_proxy_balancer module. On sites wheremod_proxy_balancer was enabled, an authorized user could send a carefullycrafted request that would cause the Apache child process handling thatrequest to crash. This could lead to a denial of service if using athreaded Multi-Processing Module. (CVE-2007-6422)A flaw was found in the mod_proxy_ftp module. On sites where mod_proxy_ftpwas enabled and a forward proxy was configured, a cross-site scriptingattack was possible against Web browsers which do not correctly derive theresponse character set following the rules in RFC 2616. (CVE-2008-0005)SL 3.0.x     SRPMS:httpd-2.0.46-70.sl3.src.rpm     i386:httpd-2.0.46-70.sl3.i386.rpmhttpd-devel-2.0.46-70.sl3.i386.rpmmod_ssl-2.0.46-70.sl3.i386.rpm     x86_64:httpd-2.0.46-70.sl3.x86_64.rpmhttpd-devel-2.0.46-70.sl3.x86_64.rpmmod_ssl-2.0.46-70.sl3.x86_64.rpmSL 4.x     SRPMS:httpd-2.0.52-38.sl4.2.src.rpm     i386:httpd-2.0.52-38.sl4.2.i386.rpmhttpd-devel-2.0.52-38.sl4.2.i386.rpmhttpd-manual-2.0.52-38.sl4.2.i386.rpmhttpd-suexec-2.0.52-38.sl4.2.i386.rpmmod_ssl-2.0.52-38.sl4.2.i386.rpm     x86_64:httpd-2.0.52-38.sl4.2.x86_64.rpmhttpd-devel-2.0.52-38.sl4.2.x86_64.rpmhttpd-manual-2.0.52-38.sl4.2.x86_64.rpmhttpd-suexec-2.0.52-38.sl4.2.x86_64.rpmmod_ssl-2.0.52-38.sl4.2.x86_64.rpmSL 5.x     SRPMS:httpd-2.2.3-11.sl5.3.src.rpm     i386:httpd-2.2.3-11.sl5.3.i386.rpmhttpd-devel-2.2.3-11.sl5.3.i386.rpmhttpd-manual-2.2.3-11.sl5.3.i386.rpmmod_ssl-2.2.3-11.sl5.3.i386.rpm     x86_64:httpd-2.2.3-11.sl5.3.x86_64.rpmhttpd-devel-2.2.3-11.sl5.3.i386.rpmhttpd-devel-2.2.3-11.sl5.3.x86_64.rpmhttpd-manual-2.2.3-11.sl5.3.x86_64.rpmmod_ssl-2.2.3-11.sl5.3.x86_64.rpm-Connie Sieh-Troy Dawson



Security Fixes

Severity

Related News