CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
EPSS
Percentile
98.6%
CentOS Errata and Security Advisory CESA-2008:0004-01
The Apache HTTP Server is a popular Web server.
A flaw was found in the mod_imap module. On sites where mod_imap was
enabled and an imagemap file was publicly available, a cross-site scripting
attack was possible. (CVE-2007-5000)
A flaw was found in the mod_autoindex module. On sites where directory
listings are used, and the “AddDefaultCharset” directive has been removed
from the configuration, a cross-site scripting attack was possible against
Web browsers which did not correctly derive the response character set
following the rules in RFC 2616. (CVE-2007-4465)
A flaw was found in the mod_status module. On sites where mod_status was
enabled and the status pages were publicly available, a cross-site
scripting attack was possible. (CVE-2007-6388)
A flaw was found in the mod_proxy_ftp module. On sites where mod_proxy_ftp
was enabled and a forward proxy was configured, a cross-site scripting
attack was possible against Web browsers which did not correctly derive the
response character set following the rules in RFC 2616. (CVE-2008-0005)
Users of Apache should upgrade to these updated packages, which contain
backported patches to resolve these issues. Users should restart Apache
after installing this update.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2008-January/076773.html
Affected packages:
apache
apache-devel
apache-manual
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 2 | i386 | apache | < 1.3.27-14.ent.c2.1 | apache-1.3.27-14.ent.c2.1.i386.rpm |
CentOS | 2 | i386 | apache-devel | < 1.3.27-14.ent.c2.1 | apache-devel-1.3.27-14.ent.c2.1.i386.rpm |
CentOS | 2 | i386 | apache-manual | < 1.3.27-14.ent.c2.1 | apache-manual-1.3.27-14.ent.c2.1.i386.rpm |