[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2008:016 -- Mandriva apache

ID: oval:org.secpod.oval:def:301373Date: (C)2012-01-07   (M)2024-02-08
Class: PATCHFamily: unix




A number of vulnerabilities were found and fixed in the Apache 2.2.x packages: A flaw found in the mod_imagemap module could lead to a cross-site scripting attack on sites where mod_imagemap was enabled and an imagemap file was publically available . A flaw found in the mod_status module could lead to a cross-site scripting attack on sites where mod_status was enabled and the status pages were publically available . A flaw found in the mod_proxy_balancer module could lead to a cross-site scripting attack against an authorized user on sites where mod_proxy_balancer was enabled . Another flaw in the mod_proxy_balancer module was found where, on sites with the module enabled, an authorized user could send a carefully crafted request that would cause the apache child process handling the request to crash, which could lead to a denial of service if using a threaded MPM . A flaw found in the mod_proxy_ftp module could lead to a cross-site scripting attack against web browsers which do not correctly derive the response character set following the rules in RFC 2616, on sites where the mod_proxy_ftp module was enabled . The updated packages have been patched to correct these issues.

Platform:
Mandriva Linux 2007.0
Mandriva Linux 2007.1
Mandriva Linux 2008.0
Product:
apache
Reference:
MDVSA-2008:016
CVE-2007-5000
CVE-2007-6388
CVE-2007-6421
CVE-2007-6422
CVE-2008-0005
CVE    5
CVE-2007-5000
CVE-2007-6388
CVE-2007-6421
CVE-2007-6422
...
CPE    3
cpe:/o:mandriva:linux:2007.1
cpe:/o:mandriva:linux:2008.0
cpe:/o:mandriva:linux:2007.0

© SecPod Technologies