Description: | Summary: The remote host is missing an update for the 'Apache2' package(s) announced via the SUSE-SU-2013:1824-1 advisory.
Vulnerability Insight: Apache2 received an LTSS rollup update which fixes various security issues and bugs.
Security issues fixed:
* CVE-2013-1896: Sending a MERGE request against a URI handled by mod_dav_svn with the source href (sent as part of the request body as XML) pointing to a URI that is not configured for DAV will trigger a segfault. [bnc#829056] * CVE-2013-1862: client data written to the RewriteLog must have terminal escape sequences escaped. [bnc#829057]
Bugs fixed:
* make sure that input that has already arrived on the socket is not discarded during a non-blocking read (read(2) returns 0 and errno is set to -EAGAIN). [bnc#815621] * make ssl connection not behave as above (this is openssl BIO stuff). [bnc#815621] * close the connection just before an attempted re-negotiation if data has been read with pipelining. This is done by resetting the keepalive status. [bnc#815621] [L3:38943] * reset the renegotiation status of a clientserver connection to RENEG_INIT to prevent falsely assumed status. [bnc#791794] * 'OPTIONS *' internal requests are intercepted by a dummy filter that kicks in for the OPTIONS method. Apple iPrint uses 'OPTIONS *' to upgrade the connection to TLS/1.0 following rfc2817. For compatibility, check if an Upgrade request header is present and skip the filter if yes. [bnc#791794]
Security Issue references:
* CVE-2013-1896 > * CVE-2013-1862 >
Affected Software/OS: 'Apache2' package(s) on SUSE Linux Enterprise Server 11-SP1.
Solution: Please install the updated package(s).
CVSS Score: 5.1
CVSS Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P
|