Rapid7 Vulnerability & Exploit Database

RHSA-2008:0007: httpd security update

Back to Search

RHSA-2008:0007: httpd security update

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
01/11/2008
Created
07/25/2018
Added
03/10/2008
Modified
07/12/2017

Description

Updated Apache httpd packages that correct security issues are now available for Red Hat Application Stack v1 This update has been rated as having moderate security impact by the Red Hat Security Response Team.

The Apache HTTP Server is a popular Web server. A flaw was found in the mod_imagemap module. On sites where mod_imagemap was enabled and an imagemap file was publicly available, a cross-site scripting attack was possible. (CVE-2007-5000) A flaw was found in the mod_status module. On sites where mod_status was enabled and the status pages were publicly accessible, a cross-site scripting attack was possible. (CVE-2007-6388) A flaw was found in the mod_proxy_ftp module. On sites where mod_proxy_ftp was enabled and a forward proxy was configured, a cross-site scripting attack was possible against browsers which do not correctly derive the response character set following the rules in RFC 2616. (CVE-2008-0005) Users of httpd should upgrade to these updated packages, which contain backported patches to correct these issues. Users should restart httpd after installing this update.

Solution(s)

  • redhat-upgrade-httpd
  • redhat-upgrade-httpd-devel
  • redhat-upgrade-httpd-manual
  • redhat-upgrade-mod_ssl

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;