httpd-2.2.3-31.2.1AXS3

エラータID: AXSA:2009-424:03

Release date: 
Tuesday, December 1, 2009 - 19:30
Subject: 
httpd-2.2.3-31.2.1AXS3
Affected Channels: 
Asianux Server 3 for x86_64
Asianux Server 3 for x86
Severity: 
High
Description: 

The Apache HTTP Server is a powerful, efficient, and extensible web server.
Security bugs fixed with this release:
CVE-2009-3094
The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
CVE-2009-3095
The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
CVE-2009-3555
The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a plaintext injection attack, aka the Project Mogul issue.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. httpd-2.2.3-31.2.1AXS3.src.rpm
    MD5: 62f8cef4d20e6795a9a263cd9e036b18
    SHA-256: 7c7524345ce180e1f042de482229cd7495a5bb83096b7512ec4c67cefee387bf
    Size: 6.19 MB

Asianux Server 3 for x86
  1. httpd-2.2.3-31.2.1AXS3.i386.rpm
    MD5: eecc91a5ea89b4fdf10d887047e986ef
    SHA-256: 84dc455958e791252a3cfb9f51cc679957c02ea26d9712559a8e07929e4bc786
    Size: 1.09 MB
  2. httpd-devel-2.2.3-31.2.1AXS3.i386.rpm
    MD5: e8caf9779bf8348def84d3530999b357
    SHA-256: f8b85b3d503238afe484c471e91b7fba3679c6378d347e623d869176eb9a0d56
    Size: 148.49 kB
  3. httpd-manual-2.2.3-31.2.1AXS3.i386.rpm
    MD5: 5f531e2fb3b388aad45323667349b693
    SHA-256: 5242333be873b166b19d2da35f027c2489f587d66a0e720ccab19e46d0f77ac7
    Size: 821.11 kB
  4. mod_ssl-2.2.3-31.2.1AXS3.i386.rpm
    MD5: 7ef43810ec344d6f0ea40e335ef142fd
    SHA-256: e7853a083f014c6462d38ff92778f14ffd558485029961aff77eb8998490fa7a
    Size: 89.02 kB

Asianux Server 3 for x86_64
  1. httpd-2.2.3-31.2.1AXS3.x86_64.rpm
    MD5: 64772138356784680fcae9c77929defb
    SHA-256: 2582817e27bd46a969d766ca71b650a9eb6ab8b04ffa84181e34792320a00c95
    Size: 1.10 MB
  2. httpd-devel-2.2.3-31.2.1AXS3.x86_64.rpm
    MD5: 8227516ffa24cfef4c69bf514556d73e
    SHA-256: 4652ee53afa60d97de08d1a2478f475cb1751a61252c267408b618b54b9ae4ba
    Size: 148.41 kB
  3. httpd-manual-2.2.3-31.2.1AXS3.x86_64.rpm
    MD5: 8056562f9a6ad5a9185851a3577d8854
    SHA-256: 6963f08cdbc72f260a6f7b01d08ed762a1cecb70769f66869d8b48d35fbb1194
    Size: 820.97 kB
  4. mod_ssl-2.2.3-31.2.1AXS3.x86_64.rpm
    MD5: 077beb816fc2a4b485ae1c045b96549e
    SHA-256: c05bf40026d9700f25e410e6826ec0a5eab6020b90139ea7ac97f16a68ea705e
    Size: 89.84 kB