USN-499-1: Apache vulnerabilities

Publication date

17 August 2007

Overview

Apache vulnerabilities


Details

Stefan Esser discovered that mod_status did not force a character set,
which could result in browsers becoming vulnerable to XSS attacks when
processing the output. If a user were tricked into viewing server
status output during a crafted server request, a remote attacker could
exploit this to modify the contents, or steal confidential data (such as
passwords), within the same domain. By default, mod_status is disabled
in Ubuntu. (CVE-2006-5752)

Niklas Edmundsson discovered that the mod_cache module could be made to
crash using a specially crafted request. A remote user could use this
to cause a denial of service if Apache was configured to use a threaded
worker. By default, mod_cache is disabled in Ubuntu. (CVE-2007-1863)

A flaw was discovered in the signal handling of Apache. A local
attacker could trick Apache into sending SIGUSR1 to other...

Stefan Esser discovered that mod_status did not force a character set,
which could result in browsers becoming vulnerable to XSS attacks when
processing the output. If a user were tricked into viewing server
status output during a crafted server request, a remote attacker could
exploit this to modify the contents, or steal confidential data (such as
passwords), within the same domain. By default, mod_status is disabled
in Ubuntu. (CVE-2006-5752)

Niklas Edmundsson discovered that the mod_cache module could be made to
crash using a specially crafted request. A remote user could use this
to cause a denial of service if Apache was configured to use a threaded
worker. By default, mod_cache is disabled in Ubuntu. (CVE-2007-1863)

A flaw was discovered in the signal handling of Apache. A local
attacker could trick Apache into sending SIGUSR1 to other processes.
The vulnerable code was only present in Ubuntu Feisty. (CVE-2007-3304)


Update instructions

In general, a standard system upgrade is sufficient to effect the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
7.04 feisty apache2-mpm-worker –  2.2.3-3.2ubuntu0.1
apache2.2-common –  2.2.3-3.2ubuntu0.1
apache2-mpm-prefork –  2.2.3-3.2ubuntu0.1
6.10 edgy apache2-mpm-worker –  2.0.55-4ubuntu4.1
apache2-common –  2.0.55-4ubuntu4.1
apache2-mpm-prefork –  2.0.55-4ubuntu4.1
6.06 dapper apache2-mpm-worker –  2.0.55-4ubuntu2.2
apache2-common –  2.0.55-4ubuntu2.2
apache2-mpm-prefork –  2.0.55-4ubuntu2.2

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›