httpd-2.2.3-31.2.1AXS3
エラータID: AXSA:2009-424:03
The Apache HTTP Server is a powerful, efficient, and extensible web server.
Security bugs fixed with this release:
CVE-2009-3094
The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
CVE-2009-3095
The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes.
CVE-2009-3555
The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a plaintext injection attack, aka the Project Mogul issue.
Update packages.
The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.
The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
N/A
SRPMS
- httpd-2.2.3-31.2.1AXS3.src.rpm
MD5: 62f8cef4d20e6795a9a263cd9e036b18
SHA-256: 7c7524345ce180e1f042de482229cd7495a5bb83096b7512ec4c67cefee387bf
Size: 6.19 MB
Asianux Server 3 for x86
- httpd-2.2.3-31.2.1AXS3.i386.rpm
MD5: eecc91a5ea89b4fdf10d887047e986ef
SHA-256: 84dc455958e791252a3cfb9f51cc679957c02ea26d9712559a8e07929e4bc786
Size: 1.09 MB - httpd-devel-2.2.3-31.2.1AXS3.i386.rpm
MD5: e8caf9779bf8348def84d3530999b357
SHA-256: f8b85b3d503238afe484c471e91b7fba3679c6378d347e623d869176eb9a0d56
Size: 148.49 kB - httpd-manual-2.2.3-31.2.1AXS3.i386.rpm
MD5: 5f531e2fb3b388aad45323667349b693
SHA-256: 5242333be873b166b19d2da35f027c2489f587d66a0e720ccab19e46d0f77ac7
Size: 821.11 kB - mod_ssl-2.2.3-31.2.1AXS3.i386.rpm
MD5: 7ef43810ec344d6f0ea40e335ef142fd
SHA-256: e7853a083f014c6462d38ff92778f14ffd558485029961aff77eb8998490fa7a
Size: 89.02 kB
Asianux Server 3 for x86_64
- httpd-2.2.3-31.2.1AXS3.x86_64.rpm
MD5: 64772138356784680fcae9c77929defb
SHA-256: 2582817e27bd46a969d766ca71b650a9eb6ab8b04ffa84181e34792320a00c95
Size: 1.10 MB - httpd-devel-2.2.3-31.2.1AXS3.x86_64.rpm
MD5: 8227516ffa24cfef4c69bf514556d73e
SHA-256: 4652ee53afa60d97de08d1a2478f475cb1751a61252c267408b618b54b9ae4ba
Size: 148.41 kB - httpd-manual-2.2.3-31.2.1AXS3.x86_64.rpm
MD5: 8056562f9a6ad5a9185851a3577d8854
SHA-256: 6963f08cdbc72f260a6f7b01d08ed762a1cecb70769f66869d8b48d35fbb1194
Size: 820.97 kB - mod_ssl-2.2.3-31.2.1AXS3.x86_64.rpm
MD5: 077beb816fc2a4b485ae1c045b96549e
SHA-256: c05bf40026d9700f25e410e6826ec0a5eab6020b90139ea7ac97f16a68ea705e
Size: 89.84 kB