Description: | Summary: The remote host is missing an update for the 'httpd' package(s) announced via the referenced advisory.
Vulnerability Insight: The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
A flaw was found in the way httpd handled HTTP Trailer headers when processing requests using chunked encoding. A malicious client could use Trailer headers to set additional HTTP headers after header processing was performed by other modules. This could, for example, lead to a bypass of header restrictions defined with mod_headers. (CVE-2013-5704)
This update also fixes the following bugs:
* The order of mod_proxy workers was not checked when httpd configuration was reloaded. When mod_proxy workers were removed, added, or their order was changed, their parameters and scores could become mixed. The order of mod_proxy workers has been made internally consistent during configuration reload. (BZ#1149906)
* The local host certificate created during firstboot contained CA extensions, which caused the httpd service to return warning messages. This has been addressed by local host certificates being generated with the '-extensions v3_req' option. (BZ#906476)
* The default mod_ssl configuration no longer enables support for SSL cipher suites using the single DES, IDEA, or SEED encryption algorithms. (BZ#1086771)
* The apachectl script did not take into account the HTTPD_LANG variable set in the /etc/sysconfig/httpd file during graceful restarts. Consequently, httpd did not use a changed value of HTTPD_LANG when the daemon was restarted gracefully. The script has been fixed to handle the HTTPD_LANG variable correctly. (BZ#963146)
* The mod_deflate module failed to check the original file size while extracting files larger than 4 GB, making it impossible to extract large files. Now, mod_deflate checks the original file size properly according to RFC1952, and it is able to decompress files larger than 4 GB. (BZ#1057695)
* The httpd service did not check configuration before restart. When a configuration contained an error, an attempt to restart httpd gracefully failed. Now, httpd checks configuration before restart and if the configuration is in an inconsistent state, an error message is printed, httpd is not stopped and a restart is not performed. (BZ#1146194)
* The SSL_CLIENT_VERIFY environment variable was incorrectly handled when the 'SSLVerifyClient optional_no_ca' and 'SSLSessionCache' options were used. When an SSL session was resumed, the SSL_CLIENT_VERIFY value was set to 'SUCCESS' instead of the previously set 'GENEROUS'. SSL_CLIENT_VERIFY is now correctly set to GENEROUS i ...
Description truncated, please see the referenced URL(s) for more information.
Affected Software/OS: httpd on Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Workstation (v. 6)
Solution: Please Install the Updated Packages.
CVSS Score: 5.0
CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
|