4.7 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:N/I:N/A:C
0.021 Low
EPSS
Percentile
87.7%
The Apache HTTP Server is a popular Web server.
The Apache HTTP Server did not verify that a process was an Apache child
process before sending it signals. A local attacker who has the ability to
run scripts on the Apache HTTP Server could manipulate the scoreboard and
cause arbitrary processes to be terminated, which could lead to a denial of
service. (CVE-2007-3304)
A flaw was found in the Apache HTTP Server mod_status module. Sites with
the server-status page publicly accessible and ExtendedStatus enabled were
vulnerable to a cross-site scripting attack. On Red Hat Enterprise Linux
the server-status page is not enabled by default and it is best practice to
not make this publicly available. (CVE-2006-5752)
Users of Apache should upgrade to these updated packages, which contain
backported patches to correct these issues. Users should restart Apache
after installing this update.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | any | ia64 | apache | <Β 1.3.27-12.ent | apache-1.3.27-12.ent.ia64.rpm |
RedHat | any | i386 | apache-manual | <Β 1.3.27-12.ent | apache-manual-1.3.27-12.ent.i386.rpm |
RedHat | any | i386 | apache | <Β 1.3.27-12.ent | apache-1.3.27-12.ent.i386.rpm |
RedHat | any | i386 | apache-devel | <Β 1.3.27-12.ent | apache-devel-1.3.27-12.ent.i386.rpm |
RedHat | any | ia64 | apache-devel | <Β 1.3.27-12.ent | apache-devel-1.3.27-12.ent.ia64.rpm |
RedHat | any | ia64 | apache-manual | <Β 1.3.27-12.ent | apache-manual-1.3.27-12.ent.ia64.rpm |