Lucene search

K
centosCentOS ProjectCESA-2005:582
HistoryJul 25, 2005 - 10:13 a.m.

httpd, mod_ssl security update

2005-07-2510:13:58
CentOS Project
lists.centos.org
43

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.963 High

EPSS

Percentile

99.5%

CentOS Errata and Security Advisory CESA-2005:582

The Apache HTTP Server is a powerful, full-featured, efficient, and
freely-available Web server.

Watchfire reported a flaw that occured when using the Apache server as an
HTTP proxy. A remote attacker could send an HTTP request with both a
“Transfer-Encoding: chunked” header and a “Content-Length” header. This
caused Apache to incorrectly handle and forward the body of the request in
a way that the receiving server processes it as a separate HTTP request.
This could allow the bypass of Web application firewall protection or lead
to cross-site scripting (XSS) attacks. The Common Vulnerabilities and
Exposures project (cve.mitre.org) assigned the name CAN-2005-2088 to this
issue.

Marc Stern reported an off-by-one overflow in the mod_ssl CRL verification
callback. In order to exploit this issue the Apache server would need to
be configured to use a malicious certificate revocation list (CRL). The
Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the
name CAN-2005-1268 to this issue.

Users of Apache httpd should update to these errata packages that contain
backported patches to correct these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-July/074133.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074134.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074139.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074140.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074141.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074142.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074150.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074151.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074154.html
https://lists.centos.org/pipermail/centos-announce/2005-July/074155.html

Affected packages:
httpd
httpd-devel
httpd-manual
httpd-suexec
mod_ssl

Upstream details at:
https://access.redhat.com/errata/RHSA-2005:582

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.963 High

EPSS

Percentile

99.5%