5.1 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
0.383 Low
EPSS
Percentile
97.2%
Issue Overview:
Cross-site scripting (XSS) flaws were found in the mod_proxy_balancer module’s manager web interface. If a remote attacker could trick a user, who was logged into the manager web interface, into visiting a specially-crafted URL, it would lead to arbitrary web script execution in the context of the user’s manager interface session. (CVE-2012-4558)
It was found that mod_rewrite did not filter terminal escape sequences from its log file. If mod_rewrite was configured with the RewriteLog directive, a remote attacker could use specially-crafted HTTP requests to inject terminal escape sequences into the mod_rewrite log file. If a victim viewed the log file with a terminal emulator, it could result in arbitrary command execution with the privileges of that user. (CVE-2013-1862)
Cross-site scripting (XSS) flaws were found in the mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp modules. An attacker could possibly use these flaws to perform XSS attacks if they were able to make the victim’s browser generate an HTTP request with a specially-crafted Host header. (CVE-2012-3499)
Affected Packages:
httpd
Issue Correction:
Run yum update httpd to update your system.
New Packages:
i686:
httpd-debuginfo-2.2.24-2.31.amzn1.i686
httpd-2.2.24-2.31.amzn1.i686
mod_ssl-2.2.24-2.31.amzn1.i686
httpd-tools-2.2.24-2.31.amzn1.i686
httpd-devel-2.2.24-2.31.amzn1.i686
noarch:
httpd-manual-2.2.24-2.31.amzn1.noarch
src:
httpd-2.2.24-2.31.amzn1.src
x86_64:
httpd-devel-2.2.24-2.31.amzn1.x86_64
mod_ssl-2.2.24-2.31.amzn1.x86_64
httpd-debuginfo-2.2.24-2.31.amzn1.x86_64
httpd-2.2.24-2.31.amzn1.x86_64
httpd-tools-2.2.24-2.31.amzn1.x86_64
Red Hat: CVE-2012-3499, CVE-2012-4558, CVE-2013-1862
Mitre: CVE-2012-3499, CVE-2012-4558, CVE-2013-1862
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | httpd-debuginfo | < 2.2.24-2.31.amzn1 | httpd-debuginfo-2.2.24-2.31.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | httpd | < 2.2.24-2.31.amzn1 | httpd-2.2.24-2.31.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | mod_ssl | < 2.2.24-2.31.amzn1 | mod_ssl-2.2.24-2.31.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | httpd-tools | < 2.2.24-2.31.amzn1 | httpd-tools-2.2.24-2.31.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | httpd-devel | < 2.2.24-2.31.amzn1 | httpd-devel-2.2.24-2.31.amzn1.i686.rpm |
Amazon Linux | 1 | noarch | httpd-manual | < 2.2.24-2.31.amzn1 | httpd-manual-2.2.24-2.31.amzn1.noarch.rpm |
Amazon Linux | 1 | x86_64 | httpd-devel | < 2.2.24-2.31.amzn1 | httpd-devel-2.2.24-2.31.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | mod_ssl | < 2.2.24-2.31.amzn1 | mod_ssl-2.2.24-2.31.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | httpd-debuginfo | < 2.2.24-2.31.amzn1 | httpd-debuginfo-2.2.24-2.31.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | httpd | < 2.2.24-2.31.amzn1 | httpd-2.2.24-2.31.amzn1.x86_64.rpm |