English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 102521 CVE descriptions
and 54701 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2008-6393
2008-08-07 21:13:01
--------------------------------------------------------------------------------

Name        : httpd
Product     : Fedora 9
Version     : 2.2.9
Release     : 1.fc9
URL         : http://httpd.apache.org/
Summary     : Apache HTTP Server
Description :
The Apache HTTP Server is a powerful, efficient, and extensible
web server.

--------------------------------------------------------------------------------
Update Information:

This update includes the latest release of httpd 2.2.    Two security issues are
fixed in this update:    A flaw was found in the handling of excessive interim
responses from an origin server when using mod_proxy_http.  In a forward proxy
configuration, if a user of the proxy could be tricked into visiting a malicious
web server, the proxy could be forced into consuming a large amount of stack or
heap memory.  This could lead to an eventual process crash due to stack space
exhaustion.    A flaw was found in the handling of compression structures
between mod_ssl and OpenSSL.  A remote attacker enabling compression in an SSL
handshake could cause a memory leak in the server, leading to a denial of
service.
--------------------------------------------------------------------------------
ChangeLog:

* Fri May 23 2008 Dennis Gilmore <dennis@ausil.us> - 2.2.8-3.1
- minor rebuild for sparc
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #447268 - CVE-2008-1678 httpd: mod_ssl per-connection memory leak for connections with zlib compression
        https://bugzilla.redhat.com/show_bug.cgi?id=447268
  [ 2 ] Bug #451615 - CVE-2008-2364 httpd: mod_proxy_http DoS via excessive interim responses from the origin server
        https://bugzilla.redhat.com/show_bug.cgi?id=451615
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update httpd' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------

_______________________________________________
Fedora-package-announce mailing list
Fedora-package-announce@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-package-announce

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2017 E-Soft Inc. All rights reserved.