Full Disclosure mailing list archives

rPSA-2009-0154-1 httpd mod_ssl


From: rPath Update Announcements <announce-noreply () rpath com>
Date: Tue, 24 Nov 2009 18:56:52 -0500

rPath Security Advisory: 2009-0154-1
Published: 2009-11-24
Products:
    rPath Appliance Platform Linux Service 1
    rPath Linux 1

Rating: Major
Exposure Level Classification:
    Indirect Deterministic Weakness
Updated Versions:
    httpd=conary.rpath.com@rpl:1/2.0.63-0.9-1
    mod_ssl=conary.rpath.com@rpl:1/2.0.63-0.9-1

rPath Issue Tracking System:
    https://issues.rpath.com/browse/RPL-3107
    https://issues.rpath.com/browse/RPL-3146

References:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891

Description:
    Previous versions of httpd are vulnerable to a man-in-the-middle attack
    during TLS session renegotiation, sometimes referred to as the "Project
    Mogul" issue.  This vulnerability has been addressed in this update.
    Additionally, two denial of service vulnerabilities and an access
    restriction bypass in mod_proxy_ftp are resolved in this update.

http://wiki.rpath.com/Advisories:rPSA-2009-0154

Copyright 2009 rPath, Inc.
This file is distributed under the terms of the MIT License.
A copy is available at http://www.rpath.com/permanent/mit-license.html

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Current thread: