5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.963 High
EPSS
Percentile
99.5%
CentOS Errata and Security Advisory CESA-2005:582
The Apache HTTP Server is a powerful, full-featured, efficient, and
freely-available Web server.
Watchfire reported a flaw that occured when using the Apache server as an
HTTP proxy. A remote attacker could send an HTTP request with both a
“Transfer-Encoding: chunked” header and a “Content-Length” header. This
caused Apache to incorrectly handle and forward the body of the request in
a way that the receiving server processes it as a separate HTTP request.
This could allow the bypass of Web application firewall protection or lead
to cross-site scripting (XSS) attacks. The Common Vulnerabilities and
Exposures project (cve.mitre.org) assigned the name CAN-2005-2088 to this
issue.
Marc Stern reported an off-by-one overflow in the mod_ssl CRL verification
callback. In order to exploit this issue the Apache server would need to
be configured to use a malicious certificate revocation list (CRL). The
Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the
name CAN-2005-1268 to this issue.
Users of Apache httpd should update to these errata packages that contain
backported patches to correct these issues.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-July/074133.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074134.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074139.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074140.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074141.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074142.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074150.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074151.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074154.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074155.html
Affected packages:
httpd
httpd-devel
httpd-manual
httpd-suexec
mod_ssl
Upstream details at:
https://access.redhat.com/errata/RHSA-2005:582
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 3 | i386 | httpd | < 2.0.46-46.2.ent | httpd-2.0.46-46.2.ent.i386.rpm |
CentOS | 3 | i386 | httpd-devel | < 2.0.46-46.2.ent | httpd-devel-2.0.46-46.2.ent.i386.rpm |
CentOS | 3 | i386 | mod_ssl | < 2.0.46-46.2.ent | mod_ssl-2.0.46-46.2.ent.i386.rpm |
CentOS | 3 | x86_64 | httpd | < 2.0.46-46.2.ent | httpd-2.0.46-46.2.ent.x86_64.rpm |
CentOS | 3 | x86_64 | httpd-devel | < 2.0.46-46.2.ent | httpd-devel-2.0.46-46.2.ent.x86_64.rpm |
CentOS | 3 | x86_64 | mod_ssl | < 2.0.46-46.2.ent | mod_ssl-2.0.46-46.2.ent.x86_64.rpm |
CentOS | 4 | x86_64 | httpd | < 2.0.52-12.1.ent.centos4 | httpd-2.0.52-12.1.ent.centos4.x86_64.rpm |
CentOS | 4 | x86_64 | httpd-devel | < 2.0.52-12.1.ent.centos4 | httpd-devel-2.0.52-12.1.ent.centos4.x86_64.rpm |
CentOS | 4 | x86_64 | httpd-manual | < 2.0.52-12.1.ent.centos4 | httpd-manual-2.0.52-12.1.ent.centos4.x86_64.rpm |
CentOS | 4 | x86_64 | httpd-suexec | < 2.0.52-12.1.ent.centos4 | httpd-suexec-2.0.52-12.1.ent.centos4.x86_64.rpm |