httpd-2.2.15-28.0.1.AXS4
エラータID: AXSA:2013-442:03
The Apache HTTP Server is a powerful, efficient, and extensible web server.
Security issues fixed with this release:
• CVE-2012-3499
Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
• CVE-2012-4558
Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.
• CVE-2013-1862
No information available at the time of writing, please use the CVE link below.
Update packages.
Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.
mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator.
N/A
SRPMS
- httpd-2.2.15-28.0.1.AXS4.src.rpm
MD5: cef93c936979ca3df832912fefa25521
SHA-256: 3cf3fdc992dbac7e990843b0d81f7fcc8a3a1ec2d7a907c8af204f1242c24e89
Size: 6.39 MB
Asianux Server 4 for x86
- httpd-2.2.15-28.0.1.AXS4.i686.rpm
MD5: e86fac43fa14cb3edff75c5ee1868435
SHA-256: c024385c21a451dff21fe1c717d5bf91d87fc4aa3bc60d076ac1eda13dd02afd
Size: 827.21 kB - httpd-devel-2.2.15-28.0.1.AXS4.i686.rpm
MD5: b5495edfc7eeb7ca821fe4f91584ebf7
SHA-256: 0c9f982fd7f077d3dc3eb421020cb90743477865776f045bae4d2e99c52b57c6
Size: 149.63 kB - httpd-manual-2.2.15-28.0.1.AXS4.noarch.rpm
MD5: 9715abb826d243d80448c86539294a88
SHA-256: 310ad34e62437230921b1ca642129a275df7363f6e6efd660de0eba62d177c46
Size: 783.09 kB - httpd-tools-2.2.15-28.0.1.AXS4.i686.rpm
MD5: ce6f4fb3ff001e602018b24e8877c460
SHA-256: 820c029df730a592ab2a785ede3eb0fb4b0f6281432c0c9d1786ca58122cecd6
Size: 72.84 kB - mod_ssl-2.2.15-28.0.1.AXS4.i686.rpm
MD5: 976d23214f3199748d2029e7c02a5a97
SHA-256: 845d6b8489531899fcb6026a4b8391a5c57cb875772fb28e2572b998981c5f09
Size: 90.67 kB
Asianux Server 4 for x86_64
- httpd-2.2.15-28.0.1.AXS4.x86_64.rpm
MD5: 9f8a53937a57bfc6fe1b80974c62d896
SHA-256: 41d4519b331fa3d095b5594847a911def60492132cd9b41668e8750f959bf526
Size: 820.49 kB - httpd-devel-2.2.15-28.0.1.AXS4.x86_64.rpm
MD5: 870da8a7cda3bd359cf76715d2c53da4
SHA-256: cda9f1dbb9668c41c82e5f0ae2a7be4ebbf0f539286517cf1dbb4d248225e642
Size: 149.16 kB - httpd-manual-2.2.15-28.0.1.AXS4.noarch.rpm
MD5: 73d075257a2b933bcfa5e09d59256cba
SHA-256: 19b2e8c865a7d194d9a79099ee2da3b40e29da5b257242148b83dd631bb1c57c
Size: 782.66 kB - httpd-tools-2.2.15-28.0.1.AXS4.x86_64.rpm
MD5: e087e7395d69e905017d8e521b2f69f1
SHA-256: 15e71458f7c3b541839541fdd377faeed2fdabf7824167ae4ca1a06a10f92293
Size: 71.77 kB - mod_ssl-2.2.15-28.0.1.AXS4.x86_64.rpm
MD5: e79fbe9811440bd1f0bd76d954946254
SHA-256: 0f4313a92613ade568a9136c8b0212fa2cf32cd9c8ad95fcb8a40175034f570d
Size: 89.56 kB - httpd-devel-2.2.15-28.0.1.AXS4.i686.rpm
MD5: b5495edfc7eeb7ca821fe4f91584ebf7
SHA-256: 0c9f982fd7f077d3dc3eb421020cb90743477865776f045bae4d2e99c52b57c6
Size: 149.63 kB