English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 143769 CVE descriptions
and 71225 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 --------------------------------------------------------------------------
   Turbolinux Security Advisory TLSA-2006-32
   http://www.turbolinux.co.jp/security/
                                             security-team@turbolinux.co.jp
 --------------------------------------------------------------------------

 Original released date: 11 Oct 2006
 Last revised: 11 Oct 2006

 Package: apache

 Summary: Multiple vulnerabilities in apache

 More information:
    Apache is a powerful, full-featured, efficient, and freely-available
    Web server. Apache is also the most popular Web server on the Internet.

    Multiple vulnerabilities exist in Apache.

 Impact:
    These vulnerabilities may allow remote attackers to execute arbitrary code.

 Affected Products:
    - Turbolinux Appliance Server 1.0 Hosting Edition
    - Turbolinux Appliance Server 1.0 Workgroup Edition
    - Turbolinux 8 Server
    - Turbolinux 7 Server


 <Turbolinux Appliance Server 1.0 Hosting Edition>

   Source Packages
   Size: MD5

   apache-1.3.27-41.src.rpm
      3114086 b74389efb31cd541046b293808f7ac2f

   Binary Packages
   Size: MD5

   apache-1.3.27-41.i586.rpm
       503800 190fb7e724eef25abac23c20f09f08b3
   apache-devel-1.3.27-41.i586.rpm
        95732 85450c060de57fa733c216eae408b868
   mod_ssl-2.8.14-41.i586.rpm
       183152 1980a14f4b4691b65bb0dc9b41d9b51a

 <Turbolinux Appliance Server 1.0 Workgroup Edition>

   Source Packages
   Size: MD5

   apache-1.3.27-41.src.rpm
      3114086 8dc5ddbc657848247a7db16ed7665795

   Binary Packages
   Size: MD5

   apache-1.3.27-41.i586.rpm
       504203 7dda47aebe60d442e0b18ddb1a51e1cf
   apache-devel-1.3.27-41.i586.rpm
        95883 bcf5bc99dd9fa3505d91b1e4681d6b62
   mod_ssl-2.8.14-41.i586.rpm
       183099 dbfa8ff12816236b01f77e63825e40ef

 <Turbolinux 8 Server>

   Source Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/SRPMS/apache-1.3.27-41.src.rpm
      3114086 02ee650f9e171744a62447e15e087a1b

   Binary Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/apache-1.3.27-41.i586.rpm
       504197 a8d71c1d1072dd83558c244f02658a01
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/apache-devel-1.3.27-41.i586.rpm
        96036 8980decd3b1988b8c61bda0451931105
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/apache-manual-1.3.27-41.i586.rpm
       852453 a864bb51aee265f948c82598bbd671dd
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/8/updates/RPMS/mod_ssl-2.8.14-41.i586.rpm
       183402 e0e58a2efda52bdd3366d94ebfaceee2

 <Turbolinux 7 Server>

   Source Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/SRPMS/apache-1.3.27-41.src.rpm
      3114086 5411c4124acb382c0c5da8584961b3b4

   Binary Packages
   Size: MD5

   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/apache-1.3.27-41.i586.rpm
       490677 c2109cefc94be44c70b8a0f95050311e
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/apache-devel-1.3.27-41.i586.rpm
        96004 754558b9d963479db19bb689d555bb91
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/apache-manual-1.3.27-41.i586.rpm
       851952 a0d64a5c67ba7458b1c29e7b0fbe2f92
   ftp://ftp.turbolinux.co.jp/pub/TurboLinux/TurboLinux/ia32/Server/7/updates/RPMS/mod_ssl-2.8.14-41.i586.rpm
       181004 97e2050b1f8746b3e7a8c542ae6df0c6


 CVE
   [CVE-2004-0488]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0488
   [CVE-2004-0700]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0700
   [CVE-2004-0885]
   http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0885

 --------------------------------------------------------------------------
 Revision History
    11 Oct 2006 Initial release
 --------------------------------------------------------------------------

 Copyright(C) 2006 Turbolinux, Inc. All rights reserved. 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFFKm6rK0LzjOqIJMwRAspvAJ9P33PqAgN1uIC/5laz83Enqo/JhgCcD+bq
ZDQ6zPK9rQ8MldJYJOKmqSE=
=HJm9
-----END PGP SIGNATURE-----

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe

© 1998-2019 E-Soft Inc. All rights reserved.