[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SA:2009:050 -- SUSE apache2,libapr1 potential code execution

ID: oval:org.secpod.oval:def:400077Date: (C)2012-01-31   (M)2024-02-19
Class: PATCHFamily: unix




The Apache web server was updated to fix various security issues: - the option IncludesNOEXEC could be bypassed via .htaccess - mod_proxy could run into an infinite loop when used as reverse proxy - mod_deflate continued to compress large files even after a network connection was closed, causing mod_deflate to consume large amounts of CPU - The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module allows remote FTP servers to cause a denial of service via a malformed reply to an EPSV command. - access restriction bypass in mod_proxy_ftp module Also the libapr1 and libapr-util1 Apache helper libraries were updated to fix multiple integer overflows that could probably be used to execute arbitrary code remotely

Platform:
openSUSE 10.3
openSUSE 11.1
openSUSE 11.0
Product:
apache2
libapr1
Reference:
SUSE-SA:2009:050
CVE-2009-1195
CVE-2009-1890
CVE-2009-1891
CVE-2009-2412
CVE-2009-3094
CVE-2009-3095
CVE    6
CVE-2009-2412
CVE-2009-1890
CVE-2009-1891
CVE-2009-3095
...
CPE    3
cpe:/o:opensuse:opensuse:11.1
cpe:/o:opensuse:opensuse:11.0
cpe:/o:opensuse:opensuse:10.3

© SecPod Technologies