Rapid7 Vulnerability & Exploit Database

RHSA-2014:0370: httpd security update

Back to Search

RHSA-2014:0370: httpd security update

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
03/18/2014
Created
07/25/2018
Added
04/07/2014
Modified
07/04/2017

Description

The httpd packages provide the Apache HTTP Server, a powerful, efficient,and extensible web server.It was found that the mod_dav module did not correctly strip leading whitespace from certain elements in a parsed XML. In certain httpdconfigurations that use the mod_dav module (for example when using themod_dav_svn module), a remote attacker could send a specially crafted DAVrequest that would cause the httpd child process to crash or, possibly,allow the attacker to execute arbitrary code with the privileges of the"apache" user. (CVE-2013-6438)A buffer over-read flaw was found in the httpd mod_log_config module.In configurations where cookie logging is enabled (on Red Hat EnterpriseLinux it is disabled by default), a remote attacker could use this flaw tocrash the httpd child process via an HTTP request with a malformed cookieheader. (CVE-2014-0098)All httpd users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. After installing theupdated packages, the httpd daemon will be restarted automatically.

Solution(s)

  • redhat-upgrade-httpd
  • redhat-upgrade-httpd-debuginfo
  • redhat-upgrade-httpd-devel
  • redhat-upgrade-httpd-manual
  • redhat-upgrade-httpd-tools
  • redhat-upgrade-mod_ssl

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;