English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 143769 CVE descriptions
and 71225 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 --------------------------------------------------------------------------
   Turbolinux Security Advisory TLSA-2004-28
   http://www.turbolinux.co.jp/security/
                                             security-team@turbolinux.co.jp
 --------------------------------------------------------------------------

 Original released date : 16 Sep 2004
 Last revised           : 16 Sep 2004

 Package : httpd

 Summary : Two vulnerabilities discovered in httpd

 More information :
    Apache is a powerful, full-featured, efficient, and freely-available
    Web server.  Apache is also the most popular Web server on the Internet.

    The identified vulnerability is in the apr-util library.

    The buffer overflow occurs when expanding ${ENVVAR} constructs in
    .htaccess or httpd.conf files.

 Impact :
    Allows remote attackers to cause a denial of service of the Apache server.


 Affected Products :
    - Turbolinux 10 F...
    - Turbolinux 10 Desktop

 Solution :
    Please use the turbopkg (zabom) tool to apply the update. 
 ---------------------------------------------
 [Turbolinux 10 Desktop, Turbolinux 10 F...]
 # zabom -u httpd httpd-devel httpd-manual mod_ssl
 ---------------------------------------------


 <Turbolinux 10 Desktop, Turbolinux 10 F...>

   Source Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/SRPMS/httpd-2.0.48-6.src.rpm
      6349140 5f7d07ffed7377c7742d6a12985d5464

   Binary Packages
   Size : MD5

   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/httpd-2.0.48-6.i586.rpm
       891145 9a87f6912acfc584752b9436b5023493
   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/httpd-devel-2.0.48-6.i586.rpm
       304443 ca0b114156d1224560fff651c89a6bfd
   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/httpd-manual-2.0.48-6.i586.rpm
       914827 782a5e709b19f37ce0333ed73fad0aed
   ftp://ftp.turbolinux.com/pub/TurboLinux/TurboLinux/ia32/Desktop/10/updates/RPMS/mod_ssl-2.0.48-6.i586.rpm
        76883 9a35f890210fb547b32a983e33416d8a


 References:

 CVE
   [CAN-2004-0747]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0747
   [CAN-2004-0786]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0786


 --------------------------------------------------------------------------
 Revision History
    16 Sep 2004 Initial release
 --------------------------------------------------------------------------

 Copyright(C) 2004 Turbolinux, Inc. All rights reserved. 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)

iD8DBQFBSHjkK0LzjOqIJMwRAj2QAKCxcyLzHvI7o+kberbRd59afhc8ggCeM0Mz
SoLyo8X+6Qu2YxHnLdIxwvA=
=LDJi
-----END PGP SIGNATURE-----

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.