Lucene search

K
redhatRedHatRHSA-2004:349
HistorySep 01, 2004 - 12:00 a.m.

(RHSA-2004:349) httpd security update

2004-09-0100:00:00
access.redhat.com
14

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.125 Low

EPSS

Percentile

94.9%

The Apache HTTP server is a powerful, full-featured, efficient, and
freely-available Web server.

An input filter bug in mod_ssl was discovered in Apache httpd version
2.0.50 and earlier. A remote attacker could force an SSL connection to be
aborted in a particular state and cause an Apache child process to enter an
infinite loop, consuming CPU resources. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CAN-2004-0748 to
this issue.

Additionally, this update includes the following enhancements and bug fixes:

  • included an improved version of the mod_cgi module that correctly handles
    concurrent output on stderr and stdout

  • included support for direct lookup of SSL variables using %{SSL:…}
    from mod_rewrite, or using %{…}s from mod_headers

  • restored support for use of SHA1-encoded passwords

  • added the mod_ext_filter module

Users of the Apache HTTP server should upgrade to these updated packages,
which contain backported patches that address these issues.

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.125 Low

EPSS

Percentile

94.9%