10 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.94 High
EPSS
Percentile
99.1%
CentOS Errata and Security Advisory CESA-2005:608
The Apache HTTP Server is a popular and freely-available Web server.
A flaw was discovered in mod_ssl’s handling of the “SSLVerifyClient”
directive. This flaw occurs if a virtual host is configured
using “SSLVerifyClient optional” and a directive “SSLVerifyClient
required” is set for a specific location. For servers configured in this
fashion, an attacker may be able to access resources that should otherwise
be protected, by not supplying a client certificate when connecting. The
Common Vulnerabilities and Exposures project assigned the name
CAN-2005-2700 to this issue.
A flaw was discovered in Apache httpd where the byterange filter would
buffer certain responses into memory. If a server has a dynamic
resource such as a CGI script or PHP script that generates a large amount
of data, an attacker could send carefully crafted requests in order to
consume resources, potentially leading to a Denial of Service. (CAN-2005-2728)
Users of Apache httpd should update to these errata packages that contain
backported patches to correct these issues.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2005-September/074275.html
https://lists.centos.org/pipermail/centos-announce/2005-September/074276.html
https://lists.centos.org/pipermail/centos-announce/2005-September/074279.html
https://lists.centos.org/pipermail/centos-announce/2005-September/074280.html
https://lists.centos.org/pipermail/centos-announce/2005-September/074281.html
https://lists.centos.org/pipermail/centos-announce/2005-September/074283.html
https://lists.centos.org/pipermail/centos-announce/2005-September/074286.html
https://lists.centos.org/pipermail/centos-announce/2005-September/074288.html
Affected packages:
httpd
httpd-devel
httpd-manual
httpd-suexec
mod_ssl
Upstream details at:
https://access.redhat.com/errata/RHSA-2005:608
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 3 | i386 | httpd | < 2.0.46-46.3.ent.centos.1 | httpd-2.0.46-46.3.ent.centos.1.i386.rpm |
CentOS | 3 | i386 | httpd-devel | < 2.0.46-46.3.ent.centos.1 | httpd-devel-2.0.46-46.3.ent.centos.1.i386.rpm |
CentOS | 3 | i386 | mod_ssl | < 2.0.46-46.3.ent.centos.1 | mod_ssl-2.0.46-46.3.ent.centos.1.i386.rpm |
CentOS | 3 | x86_64 | httpd | < 2.0.46-46.3.ent.centos.1 | httpd-2.0.46-46.3.ent.centos.1.x86_64.rpm |
CentOS | 3 | x86_64 | httpd-devel | < 2.0.46-46.3.ent.centos.1 | httpd-devel-2.0.46-46.3.ent.centos.1.x86_64.rpm |
CentOS | 3 | x86_64 | mod_ssl | < 2.0.46-46.3.ent.centos.1 | mod_ssl-2.0.46-46.3.ent.centos.1.x86_64.rpm |
CentOS | 4 | x86_64 | httpd | < 2.0.52-12.2.ent.centos4 | httpd-2.0.52-12.2.ent.centos4.x86_64.rpm |
CentOS | 4 | x86_64 | httpd-devel | < 2.0.52-12.2.ent.centos4 | httpd-devel-2.0.52-12.2.ent.centos4.x86_64.rpm |
CentOS | 4 | x86_64 | httpd-manual | < 2.0.52-12.2.ent.centos4 | httpd-manual-2.0.52-12.2.ent.centos4.x86_64.rpm |
CentOS | 4 | x86_64 | httpd-suexec | < 2.0.52-12.2.ent.centos4 | httpd-suexec-2.0.52-12.2.ent.centos4.x86_64.rpm |