Lucene search

K
suseSuseSUSE-SA:2009:050
HistoryOct 26, 2009 - 1:21 p.m.

potential code execution in apache2,libapr1

2009-10-2613:21:56
lists.opensuse.org
37

0.08 Low

EPSS

Percentile

93.6%

The Apache web server was updated to fix various security issues: - the option IncludesNOEXEC could be bypassed via .htaccess (CVE-2009-1195) - mod_proxy could run into an infinite loop when used as reverse proxy (CVE-2009-1890) - mod_deflate continued to compress large files even after a network connection was closed, causing mod_deflate to consume large amounts of CPU (CVE-2009-1891) - The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command. (CVE-2009-3094) - access restriction bypass in mod_proxy_ftp module (CVE-2009-3095)

Solution

There is no known workaround, please install the update packages.