Rapid7 Vulnerability & Exploit Database

RHSA-2010:0175: httpd security, bug fix, and enhancement update

Back to Search

RHSA-2010:0175: httpd security, bug fix, and enhancement update

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
03/05/2010
Created
07/25/2018
Added
04/06/2010
Modified
07/04/2017

Description

The Apache HTTP Server is a popular web server.A use-after-free flaw was discovered in the way the Apache HTTP Serverhandled request headers in subrequests. In configurations where subrequestsare used, a multithreaded MPM (Multi-Processing Module) could possibly leakinformation from other requests in request replies. (CVE-2010-0434)This update also fixes the following bug:As well, this update adds the following enhancement:Refer to the following Red Hat Knowledgebase article for more details aboutthe changed mod_ssl behavior: http://kbase.redhat.com/faq/docs/DOC-20491All httpd users should upgrade to these updated packages, which containbackported patches to correct these issues and add this enhancement. Afterinstalling the updated packages, the httpd daemon must be restarted for theupdate to take effect.

Solution(s)

  • redhat-upgrade-httpd
  • redhat-upgrade-httpd-devel
  • redhat-upgrade-httpd-manual
  • redhat-upgrade-httpd-suexec
  • redhat-upgrade-mod_ssl

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;