httpd-2.2.3-63.1.0.1.AXS3

エラータID: AXSA:2012-267:01

Release date: 
Wednesday, March 7, 2012 - 12:43
Subject: 
httpd-2.2.3-63.1.0.1.AXS3
Affected Channels: 
Asianux Server 3 for x86_64
Asianux Server 3 for x86
Severity: 
High
Description: 

The Apache HTTP Server is a powerful, efficient, and extensible web server.
Security issues fixed with this release:
CVE-2011-3607
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.
CVE-2011-3639
The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
CVE-2012-0031
scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.
CVE-2012-0053
protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. httpd-2.2.3-63.1.0.1.AXS3.src.rpm
    MD5: 81da558bf76c221d8ea71b1f923937e0
    SHA-256: 52178cc9a047de0ec9480b3730e6e0574247ae4dc4c952135dc0f719058382a3
    Size: 6.27 MB

Asianux Server 3 for x86
  1. httpd-2.2.3-63.1.0.1.AXS3.i386.rpm
    MD5: 3dd15c618d40afea567b8d313c5ba378
    SHA-256: 11bac471f6fd94ba89babc92ee5570e94bb12b3b7d044959bdf9b67401ec8d4e
    Size: 1.13 MB
  2. httpd-devel-2.2.3-63.1.0.1.AXS3.i386.rpm
    MD5: 06e3cefee82e3f482def016aeab809b6
    SHA-256: 125f2ee8feecf7f47b998db557ec349be02e150378199536dd0bc6b7f3f078cc
    Size: 154.80 kB
  3. httpd-manual-2.2.3-63.1.0.1.AXS3.i386.rpm
    MD5: 0a35a3d611d55599f6316c7502c86c75
    SHA-256: 347bb101e580c26c84d20dde7e22986c4c638697db57c2b61c5ed56220837ac9
    Size: 826.12 kB
  4. mod_ssl-2.2.3-63.1.0.1.AXS3.i386.rpm
    MD5: 1d00d243c06accac5f39086a10542ed8
    SHA-256: f35149f9a10fbd380252e70dc70ef18205866df3b30f378ec7c5398087b19814
    Size: 94.78 kB

Asianux Server 3 for x86_64
  1. httpd-2.2.3-63.1.0.1.AXS3.x86_64.rpm
    MD5: 99dadfe6a7f3661d20a44438bd5767ad
    SHA-256: 6679d69c248d363db820d065015e8c2f5e04884fcab01abdd690b3fdba059666
    Size: 1.14 MB
  2. httpd-devel-2.2.3-63.1.0.1.AXS3.x86_64.rpm
    MD5: 0a58913a17a759dd3d60df570faa951d
    SHA-256: 4aa23acdd6da7f3af0cd7a37ea8174b8f596b63dd2dba1405826b28fd38051bc
    Size: 154.73 kB
  3. httpd-manual-2.2.3-63.1.0.1.AXS3.x86_64.rpm
    MD5: 30544e6e9eeda2650b42f84ea223edcd
    SHA-256: 5fada742b42318264d683ed39084bca1f8b1a5384eabdbc07743b305d0cd72b5
    Size: 826.12 kB
  4. mod_ssl-2.2.3-63.1.0.1.AXS3.x86_64.rpm
    MD5: 8b5f3995d99d722380dc9846b4ea4956
    SHA-256: 7fa2e8a1a0550d309e32659346423940788ecab68c5f0d57de18bb573633c8c4
    Size: 95.54 kB