Ubuntu 1259-1: Apache vulnerabilities

    Date10 Nov 2011
    CategoryUbuntu
    33
    Posted ByLinuxSecurity Advisories
    Multiple vulnerabilities and a regression were fixed in the Apache HTTPserver.
    ==========================================================================
    Ubuntu Security Notice USN-1259-1
    November 11, 2011
    
    apache2, apache2-mpm-itk vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 11.10
    - Ubuntu 11.04
    - Ubuntu 10.10
    - Ubuntu 10.04 LTS
    - Ubuntu 8.04 LTS
    
    Summary:
    
    Multiple vulnerabilities and a regression were fixed in the Apache HTTP
    server.
    
    Software Description:
    - apache2: Apache HTTP server
    - apache2-mpm-itk: multiuser MPM for Apache 2.2
    
    Details:
    
    It was discovered that the mod_proxy module in Apache did not properly
    interact with the RewriteRule and ProxyPassMatch pattern matches
    in the configuration of a reverse proxy. This could allow remote
    attackers to contact internal webservers behind the proxy that were
    not intended for external exposure. (CVE-2011-3368)
    
    Stefano Nichele discovered that the mod_proxy_ajp module in Apache when
    used with mod_proxy_balancer in certain configurations could allow
    remote attackers to cause a denial of service via a malformed HTTP
    request. (CVE-2011-3348)
    
    Samuel Montosa discovered that the ITK Multi-Processing Module for
    Apache did not properly handle certain configuration sections that
    specify NiceValue but not AssignUserID, preventing Apache from dropping
    privileges correctly. This issue only affected Ubuntu 10.04 LTS, Ubuntu
    10.10 and Ubuntu 11.04. (CVE-2011-1176)
    
    USN 1199-1 fixed a vulnerability in the byterange filter of Apache. The
    upstream patch introduced a regression in Apache when handling specific
    byte range requests. This update fixes the issue.
    
    Original advisory details:
    
     A flaw was discovered in the byterange filter in Apache. A remote attacker
     could exploit this to cause a denial of service via resource exhaustion.
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 11.10:
      apache2.2-bin                   2.2.20-1ubuntu1.1
    
    Ubuntu 11.04:
      apache2-mpm-itk                 2.2.17-1ubuntu1.4
      apache2.2-bin                   2.2.17-1ubuntu1.4
    
    Ubuntu 10.10:
      apache2-mpm-itk                 2.2.16-1ubuntu3.4
      apache2.2-bin                   2.2.16-1ubuntu3.4
    
    Ubuntu 10.04 LTS:
      apache2-mpm-itk                 2.2.14-5ubuntu8.7
      apache2.2-bin                   2.2.14-5ubuntu8.7
    
    Ubuntu 8.04 LTS:
      apache2.2-common                2.2.8-1ubuntu0.22
    
    In general, a standard system update will make all the necessary changes.
    
    References:
      http://www.ubuntu.com/usn/usn-1259-1
      CVE-2011-1176, CVE-2011-3348, CVE-2011-3368
    
    Package Information:
      https://launchpad.net/ubuntu/+source/apache2/2.2.20-1ubuntu1.1
      https://launchpad.net/ubuntu/+source/apache2/2.2.17-1ubuntu1.4
      https://launchpad.net/ubuntu/+source/apache2/2.2.16-1ubuntu3.4
      https://launchpad.net/ubuntu/+source/apache2/2.2.14-5ubuntu8.7
      https://launchpad.net/ubuntu/+source/apache2/2.2.8-1ubuntu0.22
      https://launchpad.net/ubuntu/+source/apache2-mpm-itk/2.2.6-01-1build3.14
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"37","type":"x","order":"1","pct":51.39,"resources":[]},{"id":"88","title":"Should be more technical","votes":"10","type":"x","order":"2","pct":13.89,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"25","type":"x","order":"3","pct":34.72,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.