Lucene search

K
centosCentOS ProjectCESA-2005:608
HistorySep 06, 2005 - 3:58 p.m.

httpd, mod_ssl security update

2005-09-0615:58:02
CentOS Project
lists.centos.org
47

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.94 High

EPSS

Percentile

99.1%

CentOS Errata and Security Advisory CESA-2005:608

The Apache HTTP Server is a popular and freely-available Web server.

A flaw was discovered in mod_ssl’s handling of the “SSLVerifyClient”
directive. This flaw occurs if a virtual host is configured
using “SSLVerifyClient optional” and a directive “SSLVerifyClient
required” is set for a specific location. For servers configured in this
fashion, an attacker may be able to access resources that should otherwise
be protected, by not supplying a client certificate when connecting. The
Common Vulnerabilities and Exposures project assigned the name
CAN-2005-2700 to this issue.

A flaw was discovered in Apache httpd where the byterange filter would
buffer certain responses into memory. If a server has a dynamic
resource such as a CGI script or PHP script that generates a large amount
of data, an attacker could send carefully crafted requests in order to
consume resources, potentially leading to a Denial of Service. (CAN-2005-2728)

Users of Apache httpd should update to these errata packages that contain
backported patches to correct these issues.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-September/074275.html
https://lists.centos.org/pipermail/centos-announce/2005-September/074276.html
https://lists.centos.org/pipermail/centos-announce/2005-September/074279.html
https://lists.centos.org/pipermail/centos-announce/2005-September/074280.html
https://lists.centos.org/pipermail/centos-announce/2005-September/074281.html
https://lists.centos.org/pipermail/centos-announce/2005-September/074283.html
https://lists.centos.org/pipermail/centos-announce/2005-September/074286.html
https://lists.centos.org/pipermail/centos-announce/2005-September/074288.html

Affected packages:
httpd
httpd-devel
httpd-manual
httpd-suexec
mod_ssl

Upstream details at:
https://access.redhat.com/errata/RHSA-2005:608

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.94 High

EPSS

Percentile

99.1%