CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
EPSS
Percentile
98.6%
CentOS Errata and Security Advisory CESA-2007:0556
The Apache HTTP Server is a popular Web server.
The Apache HTTP Server did not verify that a process was an Apache child
process before sending it signals. A local attacker with the ability to run
scripts on the Apache HTTP Server could manipulate the scoreboard and cause
arbitrary processes to be terminated which could lead to a denial of
service (CVE-2007-3304). This issue is not exploitable on Red Hat
Enterprise Linux 5 if using the default SELinux targeted policy.
A flaw was found in the Apache HTTP Server mod_status module. On sites
where the server-status page is publicly accessible and ExtendedStatus is
enabled this could lead to a cross-site scripting attack. On Red Hat
Enterprise Linux the server-status page is not enabled by default and it is
best practice to not make this publicly available. (CVE-2006-5752)
A bug was found in the Apache HTTP Server mod_cache module. On sites where
caching is enabled, a remote attacker could send a carefully crafted
request that would cause the Apache child process handling that request to
crash. This could lead to a denial of service if using a threaded
Multi-Processing Module. (CVE-2007-1863)
Users of httpd should upgrade to these updated packages, which contain
backported patches to correct these issues. Users should restart Apache
after installing this update.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2007-June/076152.html
https://lists.centos.org/pipermail/centos-announce/2007-June/076153.html
Affected packages:
httpd
httpd-devel
httpd-manual
mod_ssl
Upstream details at:
https://access.redhat.com/errata/RHSA-2007:0556
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 5 | i386 | httpd | <Β 2.2.3-7.el5.centos | httpd-2.2.3-7.el5.centos.i386.rpm |
CentOS | 5 | i386 | httpd-devel | <Β 2.2.3-7.el5.centos | httpd-devel-2.2.3-7.el5.centos.i386.rpm |
CentOS | 5 | i386 | httpd-manual | <Β 2.2.3-7.el5.centos | httpd-manual-2.2.3-7.el5.centos.i386.rpm |
CentOS | 5 | i386 | mod_ssl | <Β 2.2.3-7.el5.centos | mod_ssl-2.2.3-7.el5.centos.i386.rpm |
CentOS | 5 | x86_64 | httpd | <Β 2.2.3-7.el5.centos | httpd-2.2.3-7.el5.centos.x86_64.rpm |
CentOS | 5 | i386 | httpd-devel | <Β 2.2.3-7.el5.centos | httpd-devel-2.2.3-7.el5.centos.i386.rpm |
CentOS | 5 | x86_64 | httpd-devel | <Β 2.2.3-7.el5.centos | httpd-devel-2.2.3-7.el5.centos.x86_64.rpm |
CentOS | 5 | x86_64 | httpd-manual | <Β 2.2.3-7.el5.centos | httpd-manual-2.2.3-7.el5.centos.x86_64.rpm |
CentOS | 5 | x86_64 | mod_ssl | <Β 2.2.3-7.el5.centos | mod_ssl-2.2.3-7.el5.centos.x86_64.rpm |