Rapid7 Vulnerability & Exploit Database

RHSA-2008:0967: httpd security and bug fix update

Back to Search

RHSA-2008:0967: httpd security and bug fix update

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
06/13/2008
Created
07/25/2018
Added
02/22/2009
Modified
07/04/2017

Description

The Apache HTTP Server is a popular Web server.A flaw was found in the mod_proxy Apache module. An attacker in control ofa Web server to which requests were being proxied could have caused alimited denial of service due to CPU consumption and stack exhaustion.(CVE-2008-2364)A flaw was found in the mod_proxy_ftp Apache module. If Apache wasconfigured to support FTP-over-HTTP proxying, a remote attacker could haveperformed a cross-site scripting attack. (CVE-2008-2939)In addition, these updated packages fix a bug found in the handling of the"ProxyRemoteMatch" directive in the Red Hat Enterprise Linux 4 httpdpackages. This bug is not present in the Red Hat Enterprise Linux 3 or RedHat Enterprise Linux 5 packages.Users of httpd should upgrade to these updated packages, which containbackported patches to correct these issues.

Solution(s)

  • redhat-upgrade-httpd
  • redhat-upgrade-httpd-devel
  • redhat-upgrade-httpd-manual
  • redhat-upgrade-httpd-suexec
  • redhat-upgrade-mod_ssl

References

  • redhat-upgrade-httpd
  • redhat-upgrade-httpd-devel
  • redhat-upgrade-httpd-manual
  • redhat-upgrade-httpd-suexec
  • redhat-upgrade-mod_ssl

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;