Beschreibung: | Description: The remote host is missing an update to httpd announced via advisory FEDORA-2009-8812.
The Apache HTTP Server is a powerful, efficient, and extensible web server.
Update Information:
This update includes the latest release of the Apache HTTP Server, version 2.2.13, fixing several security issues:
* Fix a potential Denial-of-Service attack against mod_deflate or other modules, by forcing the server to consume CPU time in compressing a large file after a client disconnects. (CVE-2009-1891) * Prevent the Includes Option from being enabled in an .htaccess file if the AllowOverride restrictions do not permit it. (CVE-2009-1195) * Fix a potential Denial-of-Service attack against mod_proxy in a reverse proxy configuration, where a remote attacker can force a proxy process to consume CPU time indefinitely. (CVE-2009-1890) * mod_proxy_ajp: Avoid delivering content from a previous request which failed to send a request body. (CVE-2009-1191)
Many bug fixes are also included see the upstream changelog for further details:
http://www.apache.org/dist/httpd/CHANGES_2.2.13
ChangeLog:
* Tue Aug 18 2009 Joe Orton 2.2.13-1 - update to 2.2.13
References:
[ 1 ] Bug #509375 - CVE-2009-1890 httpd: mod_proxy reverse proxy DoS (infinite loop) https://bugzilla.redhat.com/show_bug.cgi?id=509375 [ 2 ] Bug #509125 - CVE-2009-1891 httpd: possible temporary DoS (CPU consumption) in mod_deflate https://bugzilla.redhat.com/show_bug.cgi?id=509125 [ 3 ] Bug #489436 - CVE-2009-1195 AllowOverride Options=IncludesNoExec allows Options Includes https://bugzilla.redhat.com/show_bug.cgi?id=489436
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update httpd' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2009-8812
CVSS Score: 7.1
CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C
|