SUSE-SA:2009:050 -- SUSE apache2,libapr1 potential code executionID: oval:org.secpod.oval:def:400077 | Date: (C)2012-01-31 (M)2024-02-19 |
Class: PATCH | Family: unix |
The Apache web server was updated to fix various security issues: - the option IncludesNOEXEC could be bypassed via .htaccess - mod_proxy could run into an infinite loop when used as reverse proxy - mod_deflate continued to compress large files even after a network connection was closed, causing mod_deflate to consume large amounts of CPU - The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module allows remote FTP servers to cause a denial of service via a malformed reply to an EPSV command. - access restriction bypass in mod_proxy_ftp module Also the libapr1 and libapr-util1 Apache helper libraries were updated to fix multiple integer overflows that could probably be used to execute arbitrary code remotely
Platform: |
openSUSE 10.3 |
openSUSE 11.1 |
openSUSE 11.0 |