Rapid7 Vulnerability & Exploit Database

RHSA-2010:0168: httpd security and enhancement update

Back to Search

RHSA-2010:0168: httpd security and enhancement update

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
03/05/2010
Created
07/25/2018
Added
04/06/2010
Modified
07/04/2017

Description

The Apache HTTP Server is a popular web server.It was discovered that mod_proxy_ajp incorrectly returned an "InternalServer Error" response when processing certain malformed requests, whichcaused the back-end server to be marked as failed in configurations wheremod_proxy is used in load balancer mode. A remote attacker could causemod_proxy to not send requests to back-end AJP (Apache JServ Protocol)servers for the retry timeout period (60 seconds by default) by sendingspecially-crafted requests. (CVE-2010-0408)A use-after-free flaw was discovered in the way the Apache HTTP Serverhandled request headers in subrequests. In configurations where subrequestsare used, a multithreaded MPM (Multi-Processing Module) could possibly leakinformation from other requests in request replies. (CVE-2010-0434)This update also adds the following enhancement:Refer to the following Red Hat Knowledgebase article for more details aboutthe changed mod_ssl behavior: http://kbase.redhat.com/faq/docs/DOC-20491All httpd users should upgrade to these updated packages, which containbackported patches to correct these issues and add this enhancement. Afterinstalling the updated packages, the httpd daemon must be restarted for theupdate to take effect.

Solution(s)

  • redhat-upgrade-httpd
  • redhat-upgrade-httpd-devel
  • redhat-upgrade-httpd-manual
  • redhat-upgrade-mod_ssl

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;