USN-499-1: Apache vulnerabilities

17 August 2007

apache2 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 7.04
  • Ubuntu 6.10
  • Ubuntu 6.06 LTS

Software Description

Details

Stefan Esser discovered that mod_status did not force a character set, which could result in browsers becoming vulnerable to XSS attacks when processing the output. If a user were tricked into viewing server status output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data (such as passwords), within the same domain. By default, mod_status is disabled in Ubuntu. (CVE-2006-5752)

Niklas Edmundsson discovered that the mod_cache module could be made to crash using a specially crafted request. A remote user could use this to cause a denial of service if Apache was configured to use a threaded worker. By default, mod_cache is disabled in Ubuntu. (CVE-2007-1863)

A flaw was discovered in the signal handling of Apache. A local attacker could trick Apache into sending SIGUSR1 to other processes. The vulnerable code was only present in Ubuntu Feisty. (CVE-2007-3304)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 7.04
apache2-mpm-prefork - 2.2.3-3.2ubuntu0.1
apache2-mpm-worker - 2.2.3-3.2ubuntu0.1
apache2.2-common - 2.2.3-3.2ubuntu0.1
Ubuntu 6.10
apache2-common - 2.0.55-4ubuntu4.1
apache2-mpm-prefork - 2.0.55-4ubuntu4.1
apache2-mpm-worker - 2.0.55-4ubuntu4.1
Ubuntu 6.06 LTS
apache2-common - 2.0.55-4ubuntu2.2
apache2-mpm-prefork - 2.0.55-4ubuntu2.2
apache2-mpm-worker - 2.0.55-4ubuntu2.2

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system upgrade is sufficient to effect the necessary changes.

References