[Forgot Password]
Login  Register Subscribe












Paid content will be excluded from the download.

Download | Alert*

ELSA-2013-0130 -- Oracle httpd

ID: oval:org.secpod.oval:def:1500021Date: (C)2013-03-20   (M)2018-06-20
Class: PATCHFamily: unix

Updated httpd packages that fix multiple security issues, various bugs,and add enhancements are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having lowsecurity impact. Common Vulnerability Scoring System base scores,which give detailed severity ratings, are available for each vulnerabilityfrom the CVE links in the References section. The httpd packages contain the Apache HTTP Server , which is the namesake project of The Apache Software Foundation. Input sanitization flaws were found in the mod_negotiation module. A remote attacker able to upload or create files with arbitrary names in a directorythat has the MultiViews options enabled, could use these flaws to conductcross-site scripting and HTTP response splitting attacks against users visiting the site. Bug fixes:* Previously, no check was made to see if the/etc/pki/tls/private/localhost.key file was a valid key prior to runningthe "%post" script for the "mod_ssl" package. Consequently, when/etc/pki/tls/certs/localhost.crt did not exist and "localhost.key" was present but invalid, upgrading the Apache HTTP Server daemon with mod_ssl failed. The "%post" script has been fixed to test for an existing SSL key. As a result, upgrading httpd with mod_ssl now proceeds asexpected. * The "mod_ssl" module did not support operation under FIPS mode. Consequently, when operating Red Hat Enterprise Linux 5 with FIPS modeenabled, httpd failed to start. An upstream patch has been applied to disable non-FIPS functionality if operating under FIPS mode and httpd nowstarts as expected. * Prior to this update, httpd exit status codes were not Linux StandardBase compliant. When the command "service httpd reload" was run and httpd failed, the exit status code returned was "0" and not in the range 1to 6 as expected. A patch has been applied to the init script and httpd nowreturns "1" as an exit status code. * Chunked Transfer Coding is described in RFC 2616. Previously, theApache server did not correctly handle a chunked encoded POST request with a "chunk-size" or "chunk-extension" value of 32 bytes or more. Consequently, when such a POST request was made the server did not respond. An upstream patch has been applied and the problem no longer occurs.* Due to a regression, when mod_cache received a non-cacheable 304response, the headers were served incorrectly. Consequently, compresseddata could be returned to the client with out the cached headers to indicatethe data was compressed. An upstream patch has been applied to mergeresponse and cached headers before data from the cache is served to the client. As a result, cached data is now correctly interpreted by the client. * In a proxy configuration, certain response-line strings were not handled correctly. If a response-line with out a "description" string was receivedfrom the origin server, for a non-standard status code, such as the "450"status code, a "500 Internal Server Error" would be returned to the client. This bug has been fixed so that the original response line is returned to the client. Enhancements:* The configuration directive "LDAPReferrals" is now supported in addition to the previously introduced "LDAPChaseReferrals". * The AJP support module for "mod_proxy", "mod_proxy_ajp", now supports the"ProxyErrorOverride" directive. Consequently, it is now possible to configure customized error pages for web applications running on a backendserver accessed via AJP. * The "%posttrans" scriptlet which automatically restarts the httpd service after a package upgrade can now be disabled. If the file/etc/sysconfig/httpd-disable-posttrans exists, the scriptlet will notrestart the daemon. * The output of "httpd -S" now includes configured alias names for eachvirtual host. * New certificate variable names are now exposed by "mod_ssl" using the"_DN_userID" suffix, such as "SSL_CLIENT_S_DN_userID", which use the commonly used object identifier definition of "userID", OID0.9.2342.19200300.100.1.1. All users of httpd are advised to upgrade to these updated packages, which fix these issues and add these enhancements.

Oracle Linux 5
CVE    2
CPE    29

© SecPod Technologies