4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.96 High
EPSS
Percentile
99.3%
The Apache HTTP Server is a popular Web server.
A flaw was found in the mod_imagemap module. On sites where mod_imagemap
was enabled and an imagemap file was publicly available, a cross-site
scripting attack was possible. (CVE-2007-5000)
A flaw was found in the mod_autoindex module. On sites where directory
listings are used, and the “AddDefaultCharset” directive has been removed
from the configuration, a cross-site scripting attack might have been
possible against Web browsers which do not correctly derive the response
character set following the rules in RFC 2616. (CVE-2007-4465)
A flaw was found in the mod_status module. On sites where mod_status was
enabled and the status pages were publicly available, a cross-site
scripting attack was possible. (CVE-2007-6388)
A flaw was found in the mod_proxy_balancer module. On sites where
mod_proxy_balancer was enabled, a cross-site scripting attack against an
authorized user was possible. (CVE-2007-6421)
A flaw was found in the mod_proxy_balancer module. On sites where
mod_proxy_balancer was enabled, an authorized user could send a carefully
crafted request that would cause the Apache child process handling that
request to crash. This could lead to a denial of service if using a
threaded Multi-Processing Module. (CVE-2007-6422)
A flaw was found in the mod_proxy_ftp module. On sites where mod_proxy_ftp
was enabled and a forward proxy was configured, a cross-site scripting
attack was possible against Web browsers which do not correctly derive the
response character set following the rules in RFC 2616. (CVE-2008-0005)
Users of Apache httpd should upgrade to these updated packages, which
contain backported patches to resolve these issues. Users should restart
httpd after installing this update.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 5 | i386 | httpd-manual | < 2.2.3-11.el5_1.3 | httpd-manual-2.2.3-11.el5_1.3.i386.rpm |
RedHat | 5 | s390x | httpd | < 2.2.3-11.el5_1.3 | httpd-2.2.3-11.el5_1.3.s390x.rpm |
RedHat | 5 | s390x | httpd-manual | < 2.2.3-11.el5_1.3 | httpd-manual-2.2.3-11.el5_1.3.s390x.rpm |
RedHat | 5 | i386 | httpd | < 2.2.3-11.el5_1.3 | httpd-2.2.3-11.el5_1.3.i386.rpm |
RedHat | 5 | ia64 | httpd-devel | < 2.2.3-11.el5_1.3 | httpd-devel-2.2.3-11.el5_1.3.ia64.rpm |
RedHat | 5 | x86_64 | httpd-manual | < 2.2.3-11.el5_1.3 | httpd-manual-2.2.3-11.el5_1.3.x86_64.rpm |
RedHat | 5 | i386 | httpd-devel | < 2.2.3-11.el5_1.3 | httpd-devel-2.2.3-11.el5_1.3.i386.rpm |
RedHat | 5 | s390x | mod_ssl | < 2.2.3-11.el5_1.3 | mod_ssl-2.2.3-11.el5_1.3.s390x.rpm |
RedHat | 5 | x86_64 | mod_ssl | < 2.2.3-11.el5_1.3 | mod_ssl-2.2.3-11.el5_1.3.x86_64.rpm |
RedHat | 5 | ia64 | httpd-manual | < 2.2.3-11.el5_1.3 | httpd-manual-2.2.3-11.el5_1.3.ia64.rpm |