Users login

Create an account »

JOIN XATRIX

Users login

Home » Security Advisories» Mandrake » Updated apache2 packages fix multiple vulnerabilities

Updated apache2 packages fix multiple vulnerabilities

Several vulnerabilities were discovered in Apache 2.x versions prior to 2.0.47

  • Vendor: Mandrake
  • Vendor ID: MDKSA-2003:075
  • Date: July 21, 2003


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

Mandrake Linux Security Update Advisory
________________________________________________________________________

Package name: apache2
Advisory ID: MDKSA-2003:075
Date: July 21st, 2003

Affected versions: 9.1
________________________________________________________________________

Problem Description:

Several vulnerabilities were discovered in Apache 2.x versions prior to
2.0.47. From the Apache 2.0.47 release notes:

Certain sequences of per-directory renegotiations and the
SSLCipherSuite directive being used to upgrade from a weak ciphersuite
to a strong one could result in the weak ciphersuite being used in
place of the new one (CAN-2003-0192).

Certain errors returned by accept() on rarely accessed ports could
cause temporary Denial of Service due to a bug in the prefork MPM
(CAN-2003-0253).

Denial of Service was caused when target host is IPv6 but FTP proxy
server can't create IPv6 socket (CAN-2003-0254).

The server would crash when going into an infinite loop due to too many
subsequent internal redirects and nested subrequests (VU#379828).

The Apache Software Foundation thanks Saheed Akhtar and Yoshioka Tsuneo
for responsibly reporting these issues.

To upgrade these apache packages, first stop Apache by issuing, as
root:

service httpd stop

After the upgrade, restart Apache with:

service httpd start
________________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0192
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0253
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0254
http://www.kb.cert.org/vuls/id/379828
http://marc.theaimsgroup.com/?l=bugtraq&m=105259038503175
________________________________________________________________________

Updated Packages:

Mandrake Linux 9.1:
6878287e750c587d3240e23f809ee9f4 9.1/RPMS/apache-conf-2.0.44-11.1mdk.i586.rpm
847ee399abf4caea566db066d725c215 9.1/RPMS/apache2-2.0.47-1.1mdk.i586.rpm
b96ec2e4ae78347e54bcdee5174268ea 9.1/RPMS/apache2-common-2.0.47-1.1mdk.i586.rpm
693fa8f4b57865352c052e6ed056f8d2 9.1/RPMS/apache2-devel-2.0.47-1.1mdk.i586.rpm
b52cc16627ecc10e75cf0064b23cdd79 9.1/RPMS/apache2-manual-2.0.47-1.1mdk.i586.rpm
5e53cb7985228e1387363b98235fbf27 9.1/RPMS/apache2-mod_dav-2.0.47-1.1mdk.i586.rpm
7bb48f701eb345b2dfbc7a2b4f5a58a1 9.1/RPMS/apache2-mod_ldap-2.0.47-1.1mdk.i586.rpm
e0b5a5df69eff6d11c1ee3d153bf4522 9.1/RPMS/apache2-mod_ssl-2.0.47-1.1mdk.i586.rpm
0d7aad34a3609bed609d0144eafe8c67 9.1/RPMS/apache2-modules-2.0.47-1.1mdk.i586.rpm
a6fe923d55c30533a257194b90175898 9.1/RPMS/apache2-source-2.0.47-1.1mdk.i586.rpm
58f60b14beda6d52843fd59c7b4ae45b 9.1/RPMS/libapr0-2.0.47-1.1mdk.i586.rpm
6ca5928088016125c0493ba42e42d8bd 9.1/SRPMS/apache-conf-2.0.44-11.1mdk.src.rpm
a649bb491709936ab8c69944d8daae9f 9.1/SRPMS/apache2-2.0.47-1.1mdk.src.rpm

Mandrake Linux 9.1/PPC:
6f1c1f3393a2517d2a6efc060986d5f6 ppc/9.1/RPMS/apache-conf-2.0.44-11.1mdk.ppc.rpm
7692cc8ceb9570d00bdcd14a31635ea8 ppc/9.1/RPMS/apache2-2.0.47-1.1mdk.ppc.rpm
4d0a1f922b53da1cad75c0ffe92b6eb6 ppc/9.1/RPMS/apache2-common-2.0.47-1.1mdk.ppc.rpm
6428efa29c215a11d16af2eb19c66df0 ppc/9.1/RPMS/apache2-devel-2.0.47-1.1mdk.ppc.rpm
4e09ede360c766be3480f26f06e898da ppc/9.1/RPMS/apache2-manual-2.0.47-1.1mdk.ppc.rpm
d8a9778144123ed670e69efae82704df ppc/9.1/RPMS/apache2-mod_dav-2.0.47-1.1mdk.ppc.rpm
1d11cb6e70fb41ab59fe97291c883825 ppc/9.1/RPMS/apache2-mod_ldap-2.0.47-1.1mdk.ppc.rpm
c555df0597fbaf7a7600c86b77470830 ppc/9.1/RPMS/apache2-mod_ssl-2.0.47-1.1mdk.ppc.rpm
870f375144db36fa7f97b4e4a220b76f ppc/9.1/RPMS/apache2-modules-2.0.47-1.1mdk.ppc.rpm
36afbb4e44d0525a97f36a22eddc3fea ppc/9.1/RPMS/apache2-source-2.0.47-1.1mdk.ppc.rpm
190aa752b6b00ac28d5c246d35d9cdef ppc/9.1/RPMS/libapr0-2.0.47-1.1mdk.ppc.rpm
6ca5928088016125c0493ba42e42d8bd ppc/9.1/SRPMS/apache-conf-2.0.44-11.1mdk.src.rpm
a649bb491709936ab8c69944d8daae9f ppc/9.1/SRPMS/apache2-2.0.47-1.1mdk.src.rpm
________________________________________________________________________

Bug IDs fixed (see https://qa.mandrakesoft.com for more information):
________________________________________________________________________

To upgrade automatically, use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

A list of FTP mirrors can be obtained from:

http://www.mandrakesecure.net/en/ftp.php

All packages are signed by MandrakeSoft for security. You can obtain
the GPG public key of the Mandrake Linux Security Team by executing:

gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98

Please be aware that sometimes it takes the mirrors a few hours to
update.

You can view other update advisories for Mandrake Linux at:

http://www.mandrakesecure.net/en/advisories/

MandrakeSoft has several security-related mailing list services that
anyone can subscribe to. Information on these lists can be obtained by
visiting:

http://www.mandrakesecure.net/en/mlist.php

If you want to report vulnerabilities, please contact

security_linux-mandrake.com

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQE/HHUDmqjQ0CJFipgRAmb/AKDDasRYVcndQuj3uMZ66ygxNB/4KQCeJuyB
9s5JS4qAJYa7TYKGQ0ybSoU=
=Abo/
-----END PGP SIGNATURE-----

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »