apache security update

2008-01-16T02:42:35
ID CESA-2008:0004-01
Type centos
Reporter CentOS Project
Modified 2008-01-16T02:42:35

Description

CentOS Errata and Security Advisory CESA-2008:0004-01

The Apache HTTP Server is a popular Web server.

A flaw was found in the mod_imap module. On sites where mod_imap was enabled and an imagemap file was publicly available, a cross-site scripting attack was possible. (CVE-2007-5000)

A flaw was found in the mod_autoindex module. On sites where directory listings are used, and the "AddDefaultCharset" directive has been removed from the configuration, a cross-site scripting attack was possible against Web browsers which did not correctly derive the response character set following the rules in RFC 2616. (CVE-2007-4465)

A flaw was found in the mod_status module. On sites where mod_status was enabled and the status pages were publicly available, a cross-site scripting attack was possible. (CVE-2007-6388)

A flaw was found in the mod_proxy_ftp module. On sites where mod_proxy_ftp was enabled and a forward proxy was configured, a cross-site scripting attack was possible against Web browsers which did not correctly derive the response character set following the rules in RFC 2616. (CVE-2008-0005)

Users of Apache should upgrade to these updated packages, which contain backported patches to resolve these issues. Users should restart Apache after installing this update.

Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2008-January/026649.html

Affected packages: apache apache-devel apache-manual

Upstream details at: https://rhn.redhat.com/errata/rh21as-errata.html