Vulnerability & Exploit Database

Back to search

RHSA-2013:0512: httpd security, bug fix, and enhancement update

Severity CVSS Published Added Modified
5 (AV:N/AC:L/Au:N/C:N/I:N/A:P) November 30, 2012 February 21, 2013 July 04, 2017


The httpd packages contain the Apache HTTP Server (httpd), which is thenamesake project of The Apache Software Foundation.An input sanitization flaw was found in the mod_negotiation Apache HTTPServer module. A remote attacker able to upload or create files witharbitrary names in a directory that has the MultiViews options enabled,could use this flaw to conduct cross-site scripting attacks against usersvisiting the site. (CVE-2008-0455, CVE-2012-2687)It was discovered that mod_proxy_ajp, when used in configurations withmod_proxy in load balancer mode, would mark a back-end server as failedwhen request processing timed out, even when a previous AJP (Apache JServProtocol) CPing request was responded to by the back-end. A remoteattacker able to make a back-end use an excessive amount of time toprocess a request could cause mod_proxy to not send requests to back-endAJP servers for the retry timeout period or until all back-end serverswere marked as failed. (CVE-2012-4557)These updated httpd packages include numerous bug fixes and enhancements.Space precludes documenting all of these changes in this advisory. Usersare directed to the Red Hat Enterprise Linux 6.4 Technical Notes, linkedto in the References, for information on the most significant of thesechanges.All users of httpd are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues and add theseenhancements. After installing the updated packages, the httpd daemon willbe restarted automatically.

Scan For This Vulnerability

Use our top-rated tool to discover, prioritize, and remediate your vulnerabilities

 Free InsightVM Trial




Related Vulnerabilities