Full Disclosure mailing list archives
MDKSA-2003:075 - Updated apache2 packages fix multiple vulnerabilities
From: Mandrake Linux Security Team <security () linux-mandrake com>
Date: 21 Jul 2003 23:19:32 -0000
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ Mandrake Linux Security Update Advisory ________________________________________________________________________ Package name: apache2 Advisory ID: MDKSA-2003:075 Date: July 21st, 2003 Affected versions: 9.1 ________________________________________________________________________ Problem Description: Several vulnerabilities were discovered in Apache 2.x versions prior to 2.0.47. From the Apache 2.0.47 release notes: Certain sequences of per-directory renegotiations and the SSLCipherSuite directive being used to upgrade from a weak ciphersuite to a strong one could result in the weak ciphersuite being used in place of the new one (CAN-2003-0192). Certain errors returned by accept() on rarely accessed ports could cause temporary Denial of Service due to a bug in the prefork MPM (CAN-2003-0253). Denial of Service was caused when target host is IPv6 but FTP proxy server can't create IPv6 socket (CAN-2003-0254). The server would crash when going into an infinite loop due to too many subsequent internal redirects and nested subrequests (VU#379828). The Apache Software Foundation thanks Saheed Akhtar and Yoshioka Tsuneo for responsibly reporting these issues. To upgrade these apache packages, first stop Apache by issuing, as root: service httpd stop After the upgrade, restart Apache with: service httpd start ________________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0192 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0253 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0254 http://www.kb.cert.org/vuls/id/379828 http://marc.theaimsgroup.com/?l=bugtraq&m=105259038503175 ________________________________________________________________________ Updated Packages: Mandrake Linux 9.1: 6878287e750c587d3240e23f809ee9f4 9.1/RPMS/apache-conf-2.0.44-11.1mdk.i586.rpm 847ee399abf4caea566db066d725c215 9.1/RPMS/apache2-2.0.47-1.1mdk.i586.rpm b96ec2e4ae78347e54bcdee5174268ea 9.1/RPMS/apache2-common-2.0.47-1.1mdk.i586.rpm 693fa8f4b57865352c052e6ed056f8d2 9.1/RPMS/apache2-devel-2.0.47-1.1mdk.i586.rpm b52cc16627ecc10e75cf0064b23cdd79 9.1/RPMS/apache2-manual-2.0.47-1.1mdk.i586.rpm 5e53cb7985228e1387363b98235fbf27 9.1/RPMS/apache2-mod_dav-2.0.47-1.1mdk.i586.rpm 7bb48f701eb345b2dfbc7a2b4f5a58a1 9.1/RPMS/apache2-mod_ldap-2.0.47-1.1mdk.i586.rpm e0b5a5df69eff6d11c1ee3d153bf4522 9.1/RPMS/apache2-mod_ssl-2.0.47-1.1mdk.i586.rpm 0d7aad34a3609bed609d0144eafe8c67 9.1/RPMS/apache2-modules-2.0.47-1.1mdk.i586.rpm a6fe923d55c30533a257194b90175898 9.1/RPMS/apache2-source-2.0.47-1.1mdk.i586.rpm 58f60b14beda6d52843fd59c7b4ae45b 9.1/RPMS/libapr0-2.0.47-1.1mdk.i586.rpm 6ca5928088016125c0493ba42e42d8bd 9.1/SRPMS/apache-conf-2.0.44-11.1mdk.src.rpm a649bb491709936ab8c69944d8daae9f 9.1/SRPMS/apache2-2.0.47-1.1mdk.src.rpm Mandrake Linux 9.1/PPC: 6f1c1f3393a2517d2a6efc060986d5f6 ppc/9.1/RPMS/apache-conf-2.0.44-11.1mdk.ppc.rpm 7692cc8ceb9570d00bdcd14a31635ea8 ppc/9.1/RPMS/apache2-2.0.47-1.1mdk.ppc.rpm 4d0a1f922b53da1cad75c0ffe92b6eb6 ppc/9.1/RPMS/apache2-common-2.0.47-1.1mdk.ppc.rpm 6428efa29c215a11d16af2eb19c66df0 ppc/9.1/RPMS/apache2-devel-2.0.47-1.1mdk.ppc.rpm 4e09ede360c766be3480f26f06e898da ppc/9.1/RPMS/apache2-manual-2.0.47-1.1mdk.ppc.rpm d8a9778144123ed670e69efae82704df ppc/9.1/RPMS/apache2-mod_dav-2.0.47-1.1mdk.ppc.rpm 1d11cb6e70fb41ab59fe97291c883825 ppc/9.1/RPMS/apache2-mod_ldap-2.0.47-1.1mdk.ppc.rpm c555df0597fbaf7a7600c86b77470830 ppc/9.1/RPMS/apache2-mod_ssl-2.0.47-1.1mdk.ppc.rpm 870f375144db36fa7f97b4e4a220b76f ppc/9.1/RPMS/apache2-modules-2.0.47-1.1mdk.ppc.rpm 36afbb4e44d0525a97f36a22eddc3fea ppc/9.1/RPMS/apache2-source-2.0.47-1.1mdk.ppc.rpm 190aa752b6b00ac28d5c246d35d9cdef ppc/9.1/RPMS/libapr0-2.0.47-1.1mdk.ppc.rpm 6ca5928088016125c0493ba42e42d8bd ppc/9.1/SRPMS/apache-conf-2.0.44-11.1mdk.src.rpm a649bb491709936ab8c69944d8daae9f ppc/9.1/SRPMS/apache2-2.0.47-1.1mdk.src.rpm ________________________________________________________________________ Bug IDs fixed (see https://qa.mandrakesoft.com for more information): ________________________________________________________________________ To upgrade automatically, use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. A list of FTP mirrors can be obtained from: http://www.mandrakesecure.net/en/ftp.php All packages are signed by MandrakeSoft for security. You can obtain the GPG public key of the Mandrake Linux Security Team by executing: gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98 Please be aware that sometimes it takes the mirrors a few hours to update. You can view other update advisories for Mandrake Linux at: http://www.mandrakesecure.net/en/advisories/ MandrakeSoft has several security-related mailing list services that anyone can subscribe to. Information on these lists can be obtained by visiting: http://www.mandrakesecure.net/en/mlist.php If you want to report vulnerabilities, please contact security_linux-mandrake.com Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security linux-mandrake.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQE/HHUDmqjQ0CJFipgRAmb/AKDDasRYVcndQuj3uMZ66ygxNB/4KQCeJuyB 9s5JS4qAJYa7TYKGQ0ybSoU= =Abo/ -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
Current thread:
- MDKSA-2003:075 - Updated apache2 packages fix multiple vulnerabilities Mandrake Linux Security Team (Jul 21)