Lucene search

K
centosCentOS ProjectCESA-2013:1156
HistoryAug 13, 2013 - 5:32 p.m.

httpd, mod_ssl security update

2013-08-1317:32:49
CentOS Project
lists.centos.org
103

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.958 High

EPSS

Percentile

99.4%

CentOS Errata and Security Advisory CESA-2013:1156

The Apache HTTP Server is a popular web server.

A flaw was found in the way the mod_dav module of the Apache HTTP Server
handled merge requests. An attacker could use this flaw to send a crafted
merge request that contains URIs that are not configured for DAV, causing
the httpd child process to crash. (CVE-2013-1896)

All httpd users should upgrade to these updated packages, which contain a
backported patch to correct this issue. After installing the updated
packages, the httpd daemon will be restarted automatically.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2013-August/082064.html
https://lists.centos.org/pipermail/centos-announce/2013-August/082065.html

Affected packages:
httpd
httpd-devel
httpd-manual
httpd-tools
mod_ssl

Upstream details at:
https://access.redhat.com/errata/RHSA-2013:1156

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

0.958 High

EPSS

Percentile

99.4%