Lucene search

K
centosCentOS ProjectCESA-2011:1245
HistorySep 01, 2011 - 11:41 a.m.

httpd, mod_ssl security update

2011-09-0111:41:08
CentOS Project
lists.centos.org
73

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.964 High

EPSS

Percentile

99.5%

CentOS Errata and Security Advisory CESA-2011:1245

The Apache HTTP Server is a popular web server.

A flaw was found in the way the Apache HTTP Server handled Range HTTP
headers. A remote attacker could use this flaw to cause httpd to use an
excessive amount of memory and CPU time via HTTP requests with a
specially-crafted Range header. (CVE-2011-3192)

All httpd users should upgrade to these updated packages, which contain a
backported patch to correct this issue. After installing the updated
packages, the httpd daemon must be restarted for the update to take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2011-September/079872.html
https://lists.centos.org/pipermail/centos-announce/2011-September/079873.html

Affected packages:
httpd
httpd-devel
httpd-manual
httpd-suexec
mod_ssl

Upstream details at:
https://access.redhat.com/errata/RHSA-2011:1245