Lucene search

K
amazonAmazonALAS-2013-194
HistoryMay 24, 2013 - 1:57 p.m.

Medium: httpd24

2013-05-2413:57:00
alas.aws.amazon.com
19

5.1 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.383 Low

EPSS

Percentile

97.2%

Issue Overview:

Cross-site scripting (XSS) flaws were found in the mod_proxy_balancer module’s manager web interface. If a remote attacker could trick a user, who was logged into the manager web interface, into visiting a specially-crafted URL, it would lead to arbitrary web script execution in the context of the user’s manager interface session. (CVE-2012-4558)

It was found that mod_rewrite did not filter terminal escape sequences from its log file. If mod_rewrite was configured with the RewriteLog directive, a remote attacker could use specially-crafted HTTP requests to inject terminal escape sequences into the mod_rewrite log file. If a victim viewed the log file with a terminal emulator, it could result in arbitrary command execution with the privileges of that user. (CVE-2013-1862)

Cross-site scripting (XSS) flaws were found in the mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp modules. An attacker could possibly use these flaws to perform XSS attacks if they were able to make the victim’s browser generate an HTTP request with a specially-crafted Host header. (CVE-2012-3499)

Affected Packages:

httpd24

Issue Correction:
Run yum update httpd24 to update your system.

New Packages:

i686:  
    httpd24-devel-2.4.4-2.46.amzn1.i686  
    mod24_ldap-2.4.4-2.46.amzn1.i686  
    httpd24-debuginfo-2.4.4-2.46.amzn1.i686  
    httpd24-2.4.4-2.46.amzn1.i686  
    mod24_session-2.4.4-2.46.amzn1.i686  
    mod24_proxy_html-2.4.4-2.46.amzn1.i686  
    httpd24-tools-2.4.4-2.46.amzn1.i686  
    mod24_ssl-2.4.4-2.46.amzn1.i686  
  
noarch:  
    httpd24-manual-2.4.4-2.46.amzn1.noarch  
  
src:  
    httpd24-2.4.4-2.46.amzn1.src  
  
x86_64:  
    mod24_proxy_html-2.4.4-2.46.amzn1.x86_64  
    httpd24-tools-2.4.4-2.46.amzn1.x86_64  
    httpd24-2.4.4-2.46.amzn1.x86_64  
    mod24_ssl-2.4.4-2.46.amzn1.x86_64  
    mod24_session-2.4.4-2.46.amzn1.x86_64  
    mod24_ldap-2.4.4-2.46.amzn1.x86_64  
    httpd24-devel-2.4.4-2.46.amzn1.x86_64  
    httpd24-debuginfo-2.4.4-2.46.amzn1.x86_64  

Additional References

Red Hat: CVE-2012-3499, CVE-2012-4558, CVE-2013-1862

Mitre: CVE-2012-3499, CVE-2012-4558, CVE-2013-1862

5.1 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

0.383 Low

EPSS

Percentile

97.2%