Fedora 10: httpd Security Update

    Date09 Dec 2009
    CategoryFedora
    182
    Posted ByLinuxSecurity Advisories
    This update contains the latest stable release of Apache httpd. Three security fixes are included, along with several minor bug fixes. A flaw was found in the way the TLS/SSL (Transport Layer Security/Secure Sockets Layer) protocols handle session renegotiation. A man-in-the-middle attacker could use this flaw to prefix arbitrary plain text to a client's session (for example, an HTTPS
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2009-12604
    2009-12-04 22:40:20
    --------------------------------------------------------------------------------
    
    Name        : httpd
    Product     : Fedora 10
    Version     : 2.2.14
    Release     : 1.fc10
    URL         : http://httpd.apache.org/
    Summary     : Apache HTTP Server
    Description :
    The Apache HTTP Server is a powerful, efficient, and extensible
    web server.
    
    --------------------------------------------------------------------------------
    Update Information:
    
    This update contains the latest stable release of Apache httpd. Three security
    fixes are included, along with several minor bug fixes.    A flaw was found in
    the way the TLS/SSL (Transport Layer Security/Secure Sockets Layer) protocols
    handle session renegotiation. A man-in-the-middle attacker could use this flaw
    to prefix arbitrary plain text to a client's session (for example, an HTTPS
    connection to a website). This could force the server to process an attacker's
    request as if authenticated using the victim's credentials. This update
    partially mitigates this flaw for SSL sessions to HTTP servers using mod_ssl by
    rejecting client-requested renegotiation. (CVE-2009-3555)    Note: This update
    does not fully resolve the issue for HTTPS servers. An attack is still possible
    in configurations that require a server-initiated renegotiation    A NULL
    pointer dereference flaw was found in the Apache mod_proxy_ftp module. A
    malicious FTP server to which requests are being proxied could use this flaw to
    crash an httpd child process via a malformed reply to the EPSV or PASV commands,
    resulting in a limited denial of service. (CVE-2009-3094)    A second flaw was
    found in the Apache mod_proxy_ftp module. In a reverse proxy configuration, a
    remote attacker could use this flaw to bypass intended access restrictions by
    creating a carefully-crafted HTTP Authorization header, allowing the attacker to
    send arbitrary commands to the FTP server. (CVE-2009-3095)    See the upstream
    changes file for further information:
    http://www.apache.org/dist/httpd/CHANGES_2.2.14
    --------------------------------------------------------------------------------
    ChangeLog:
    
    * Thu Dec  3 2009 Joe Orton  - 2.2.14-1
    - update to 2.2.14
    - Requires(pre): httpd in mod_ssl subpackage (#543275)
    - add partial security fix for CVE-2009-3555 (#533125)
    - add condrestart in posttrans (#491567)
    * Sun Aug 23 2009 Joe Orton  2.2.13-1
    - update to 2.2.13
    - add delaycompress to logrotate config
    * Mon Feb  9 2009 Joe Orton  2.2.11-2
    - update to 2.2.11 (#482960)
    - Require apr-util-ldap (#471898)
    --------------------------------------------------------------------------------
    References:
    
      [ 1 ] Bug #521619 - CVE-2009-3094 httpd: NULL pointer defer in mod_proxy_ftp caused by crafted EPSV and PASV reply
            https://bugzilla.redhat.com/show_bug.cgi?id=521619
      [ 2 ] Bug #522209 - CVE-2009-3095 httpd: mod_proxy_ftp FTP command injection via Authorization HTTP header
            https://bugzilla.redhat.com/show_bug.cgi?id=522209
    --------------------------------------------------------------------------------
    
    This update can be installed with the "yum" update program.  Use 
    su -c 'yum update httpd' at the command line.
    For more information, refer to "Managing Software with yum",
    available at http://docs.fedoraproject.org/yum/.
    
    All packages are signed with the Fedora Project GPG key.  More details on the
    GPG keys used by the Fedora Project can be found at
    http://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    
    _______________________________________________
    Fedora-package-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.redhat.com/mailman/listinfo/fedora-package-announce
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"7","type":"x","order":"1","pct":58.33,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":25,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"2","type":"x","order":"3","pct":16.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.