[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

MDVSA-2012:012 -- Mandriva apache

ID: oval:org.secpod.oval:def:302828Date: (C)2012-11-29   (M)2024-02-19
Class: PATCHFamily: unix




Multiple vulnerabilities has been found and corrected in apache : The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service via a cookie that lacks both a name and a value . scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function . protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a long or malformed header in conjunction with crafted web script . The updated packages have been upgraded to the latest 2.2.22 version which is not vulnerable to this issue. Additionally APR and APR-UTIL has been upgraded to the latest versions 1.4.5 and 1.4.1 respectively which holds many improvments over the previous versions.

Platform:
Mandriva Linux 2011.0
Mandriva Linux 2010.1
Product:
apache
Reference:
MDVSA-2012:012
CVE-2012-0053
CVE-2012-0031
CVE-2012-0021
CVE    3
CVE-2012-0021
CVE-2012-0031
CVE-2012-0053
CPE    2
cpe:/o:mandriva:linux:2010.1
cpe:/o:mandriva:linux:2011.0

© SecPod Technologies