USN-160-1: Apache 2 vulnerabilities
4 August 2005
Apache 2 vulnerabilities
Releases
Details
Marc Stern discovered a buffer overflow in the SSL module's
certificate revocation list (CRL) handler. If Apache is configured to
use a malicious CRL, this could possibly lead to a server crash or
arbitrary code execution with the privileges of the Apache web server.
(CAN-2005-1268)
Watchfire discovered that Apache insufficiently verified the
"Transfer-Encoding" and "Content-Length" headers when acting as an
HTTP proxy. By sending a specially crafted HTTP request, a remote
attacker who is authorized to use the proxy could exploit this to
bypass web application firewalls, poison the HTTP proxy cache, and
conduct cross-site scripting attacks against other proxy users.
(CAN-2005-2088)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 5.04
-
apache2-mpm-worker
-
-
apache2-mpm-perchild
-
-
apache2-mpm-prefork
-
-
apache2-mpm-threadpool
-
Ubuntu 4.10
-
apache2-mpm-worker
-
-
apache2-mpm-perchild
-
-
apache2-mpm-prefork
-
-
apache2-mpm-threadpool
-
In general, a standard system update will make all the necessary changes.