Action not permitted
Modal body text goes here.
cve-2011-3607
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:37:48.675Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "HPSBMU02786", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" }, { "name": "SSRT100966", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/811422" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html" }, { "name": "RHSA-2012:0543", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0543.html" }, { "name": "HPSBOV02822", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=750935" }, { "name": "SSRT100772", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133294460209056\u0026w=2" }, { "name": "RHSA-2012:0128", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0128.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "45793", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45793" }, { "name": "HPSBMU02748", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133294460209056\u0026w=2" }, { "name": "50494", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/50494" }, { "name": "RHSA-2012:0542", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0542.html" }, { "name": "1026267", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1026267" }, { "name": "APPLE-SA-2012-09-19-2", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT5501" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html" }, { "name": "20111102 Integer Overflow in Apache ap_pregsub via mod-setenvif", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-11/0023.html" }, { "name": "SSRT100877", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/" }, { "name": "76744", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/76744" }, { "name": "HPSBUX02761", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133494237717847\u0026w=2" }, { "name": "MDVSA-2013:150", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "name": "48551", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/48551" }, { "name": "DSA-2405", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2405" }, { "name": "SSRT100823", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133494237717847\u0026w=2" }, { "name": "apache-http-appregsub-bo(71093)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71093" }, { "name": "MDVSA-2012:003", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:003" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-11-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-06T10:10:32", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "HPSBMU02786", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" }, { "name": "SSRT100966", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/811422" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html" }, { "name": "RHSA-2012:0543", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0543.html" }, { "name": "HPSBOV02822", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=750935" }, { "name": "SSRT100772", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133294460209056\u0026w=2" }, { "name": "RHSA-2012:0128", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0128.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "45793", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45793" }, { "name": "HPSBMU02748", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133294460209056\u0026w=2" }, { "name": "50494", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/50494" }, { "name": "RHSA-2012:0542", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0542.html" }, { "name": "1026267", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1026267" }, { "name": "APPLE-SA-2012-09-19-2", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT5501" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html" }, { "name": "20111102 Integer Overflow in Apache ap_pregsub via mod-setenvif", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-11/0023.html" }, { "name": "SSRT100877", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/" }, { "name": "76744", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/76744" }, { "name": "HPSBUX02761", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133494237717847\u0026w=2" }, { "name": "MDVSA-2013:150", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "name": "48551", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/48551" }, { "name": "DSA-2405", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2405" }, { "name": "SSRT100823", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133494237717847\u0026w=2" }, { "name": "apache-http-appregsub-bo(71093)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71093" }, { "name": "MDVSA-2012:003", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:003" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-3607", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBMU02786", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" }, { "name": "SSRT100966", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2" }, { "name": "https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/811422", "refsource": "CONFIRM", "url": "https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/811422" }, { "name": "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html", "refsource": "MISC", "url": "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html" }, { "name": "RHSA-2012:0543", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0543.html" }, { "name": "HPSBOV02822", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=750935", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=750935" }, { "name": "SSRT100772", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133294460209056\u0026w=2" }, { "name": "RHSA-2012:0128", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0128.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "45793", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45793" }, { "name": "HPSBMU02748", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133294460209056\u0026w=2" }, { "name": "50494", "refsource": "BID", "url": "http://www.securityfocus.com/bid/50494" }, { "name": "RHSA-2012:0542", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0542.html" }, { "name": "1026267", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1026267" }, { "name": "APPLE-SA-2012-09-19-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html" }, { "name": "http://support.apple.com/kb/HT5501", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5501" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html" }, { "name": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html", "refsource": "CONFIRM", "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html" }, { "name": "20111102 Integer Overflow in Apache ap_pregsub via mod-setenvif", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-11/0023.html" }, { "name": "SSRT100877", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" }, { "name": "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/", "refsource": "MISC", "url": "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/" }, { "name": "76744", "refsource": "OSVDB", "url": "http://www.osvdb.org/76744" }, { "name": "HPSBUX02761", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133494237717847\u0026w=2" }, { "name": "MDVSA-2013:150", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "name": "48551", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48551" }, { "name": "DSA-2405", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2405" }, { "name": "SSRT100823", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133494237717847\u0026w=2" }, { "name": "apache-http-appregsub-bo(71093)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71093" }, { "name": "MDVSA-2012:003", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:003" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-3607", "datePublished": "2011-11-08T11:00:00", "dateReserved": "2011-09-21T00:00:00", "dateUpdated": "2024-08-06T23:37:48.675Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2011-3607\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2011-11-08T11:55:05.693\",\"lastModified\":\"2023-11-07T02:08:36.747\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de entero en la funci\u00f3n en ap_pregsub / util.c en el servidor HTTP Apache v2.0.x hasta la v2.0.64 y la v2.2.x hasta la v2.2.21, cuando el m\u00f3dulo mod_setenvif est\u00e1 activado, que permite a usuarios locales conseguir privilegios a trav\u00e9s de un archivo .htaccess que incluye una directiva SetEnvIf modificada, junto con un encabezado de solicitud HTTP manipulado, dando lugar a un desbordamiento de b\u00fafer basado en memoria din\u00e1mica.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:P/A:P\",\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":4.4},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":true,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-189\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"163A6EF6-7D3F-4B1F-9E03-A8C86562CC3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"154566FB-0D1A-4DC2-AFE6-49DE93850951\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB477AFB-EA39-4892-B772-586CF6D2D235\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C4962BB-0E61-4788-B582-21F05CD33AD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B35906CD-038E-4243-8A95-F0A3A43F06F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C3E2656-8071-40DA-9480-AC13010A9D09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C649D2F-A633-456E-899C-6253FDE9A626\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B940BB85-03F5-46D7-8DC9-2E1E228D3D98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82139FFA-2779-4732-AFA5-4E6E19775899\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7F717E6-BACD-4C8A-A9C5-516ADA6FEE6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08AB120B-2FEC-4EB3-9777-135D81E809AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C7FF669-12E0-4A73-BBA7-250D109148C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AB7B1F1-7202-445D-9F96-135DC0AFB1E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCB7EE53-187E-40A9-9865-0F3EDA2B5A4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D06AE8A-9BA8-4AA8-ACEA-326CD001E879\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FC1A04B-0466-48AD-89F3-1F2EF1DEBE6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19F34D08-430E-4331-A27D-667149425176\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"248BDF2C-3E78-49D1-BD9C-60C09A441724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB0FDE3D-1509-4375-8703-0D174D70B22E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFE732B5-00C9-4443-97E0-1DF21475C26B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C79C41D3-6894-4F2D-B8F8-82AB4780A824\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"449A5647-CEA6-4314-9DB8-D086F388E1C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5A407B7-F432-48F0-916A-A49952F85CA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B5AC769-D07D-43C7-B252-A5A812E7D58C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADF4DBF6-DAF0-47E7-863B-C48DB7149A78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2F19D71-0A58-4B03-B351-596EB67ECF80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EBB3FF9-CF5A-4E7B-ACE3-A198343AD485\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D721FFB5-D6D3-4F60-8B09-B3AD07EE6D4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97E8F32E-C2E5-44E3-A920-F09AF919D372\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CF37A82-49B6-45D4-B91D-FDA2D4463A0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"030D1767-2DF7-48E3-B462-4B49CA751B35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5236DC61-5557-4C24-8F5B-F48548448588\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CB9F19A-5DC0-4C44-8BAF-B8FD047DAB56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B468F9B-2514-425C-9279-0FCAF73BBD18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59FAFAD0-6B58-431B-BA90-CAE6C72844E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.0.64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FD4780F-A3A0-458E-9F23-13359E42D35E\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67AD11FB-529C-404E-A13B-284F145322B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"733D62FE-180A-4AE8-9DBF-DA1DC18C1932\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCBBB7FE-35FC-4515-8393-5145339FCE4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F519633F-AB68-495A-B85E-FD41F9F752CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A894BED6-C97D-4DA4-A13D-9CB2B3306BC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34A847D1-5AD5-4EFD-B165-7602AFC1E656\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AF3A0F5-4E5C-4278-9927-1F94F25CCAFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB63EBE5-CF14-491E-ABA5-67116DFE3E5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C2A33DE-F55F-4FD8-BB00-9C1E006CA65C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1CF6394-95D9-42AF-A442-385EFF9CEFE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02B629FB-88C8-4E85-A137-28770F1E524E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03550EF0-DF89-42FE-BF0E-994514EBD947\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4886CCAB-6D4E-45C7-B177-2E8DBEA15531\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35631AC-7C35-4F6A-A95A-3B080E5210ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CED2BA6-BE5E-4EF1-88EB-0DADD23D2EEF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0B8C9DB-401E-42B3-BAED-D09A96DE9A90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"062C20A0-05A0-4164-8330-DF6ADFE607F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D345BA35-93BB-406F-B5DC-86E49FB29C22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ED4892F-C829-4BEA-AB82-6A78F6F2426D\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2011-11/0023.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133294460209056\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133494237717847\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0128.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0542.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-0543.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/45793\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/48551\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1026267\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.apple.com/kb/HT5501\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2012/dsa-2405\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2012:003\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2013:150\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.osvdb.org/76744\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/50494\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/811422\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=750935\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/71093\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"}]}}" } }
rhsa-2012_0323
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated httpd packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The Apache HTTP Server is a popular web server.\n\nIt was discovered that the fix for CVE-2011-3368 (released via\nRHSA-2011:1392) did not completely address the problem. An attacker could\nbypass the fix and make a reverse proxy connect to an arbitrary server not\ndirectly accessible to the attacker by sending an HTTP version 0.9 request.\n(CVE-2011-3639)\n\nThe httpd server included the full HTTP header line in the default error\npage generated when receiving an excessively long or malformed header.\nMalicious JavaScript running in the server\u0027s domain context could use this\nflaw to gain access to httpOnly cookies. (CVE-2012-0053)\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the way httpd performed substitutions in regular expressions. An\nattacker able to set certain httpd settings, such as a user permitted to\noverride the httpd configuration for a specific directory using a\n\".htaccess\" file, could use this flaw to crash the httpd child process or,\npossibly, execute arbitrary code with the privileges of the \"apache\" user.\n(CVE-2011-3607)\n\nA flaw was found in the way httpd handled child process status information.\nA malicious program running with httpd child process privileges (such as a\nPHP or CGI script) could use this flaw to cause the parent httpd process to\ncrash during httpd service shutdown. (CVE-2012-0031)\n\nAll httpd users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, the httpd daemon will be restarted automatically.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0323", "url": "https://access.redhat.com/errata/RHSA-2012:0323" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://rhn.redhat.com/errata/RHSA-2011-1392.html", "url": "https://rhn.redhat.com/errata/RHSA-2011-1392.html" }, { "category": "external", "summary": "752080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=752080" }, { "category": "external", "summary": "769844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=769844" }, { "category": "external", "summary": "773744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=773744" }, { "category": "external", "summary": "785069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785069" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0323.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2024-11-05T17:43:11+00:00", "generator": { "date": "2024-11-05T17:43:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2012:0323", "initial_release_date": "2012-02-21T21:49:00+00:00", "revision_history": [ { "date": "2012-02-21T21:49:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-02-21T21:57:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T17:43:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "RHEL Desktop Workstation (v. 5 client)", "product": { "name": "RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.3-63.el5_8.1.i386", "product": { "name": "mod_ssl-1:2.2.3-63.el5_8.1.i386", "product_id": "mod_ssl-1:2.2.3-63.el5_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.3-63.el5_8.1?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-0:2.2.3-63.el5_8.1.i386", "product": { "name": "httpd-0:2.2.3-63.el5_8.1.i386", "product_id": "httpd-0:2.2.3-63.el5_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-63.el5_8.1?arch=i386" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "product": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "product_id": "httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-63.el5_8.1?arch=i386" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.3-63.el5_8.1.i386", "product": { "name": "httpd-manual-0:2.2.3-63.el5_8.1.i386", "product_id": "httpd-manual-0:2.2.3-63.el5_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.3-63.el5_8.1?arch=i386" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-63.el5_8.1.i386", "product": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.i386", "product_id": "httpd-devel-0:2.2.3-63.el5_8.1.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-63.el5_8.1?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "product": { "name": "mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "product_id": "mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.3-63.el5_8.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-0:2.2.3-63.el5_8.1.x86_64", "product": { "name": "httpd-0:2.2.3-63.el5_8.1.x86_64", "product_id": "httpd-0:2.2.3-63.el5_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-63.el5_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "product": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "product_id": "httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-63.el5_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "product": { "name": "httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "product_id": "httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.3-63.el5_8.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "product": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "product_id": "httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-63.el5_8.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.3-63.el5_8.1.src", "product": { "name": "httpd-0:2.2.3-63.el5_8.1.src", "product_id": "httpd-0:2.2.3-63.el5_8.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-63.el5_8.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.3-63.el5_8.1.ia64", "product": { "name": "mod_ssl-1:2.2.3-63.el5_8.1.ia64", "product_id": "mod_ssl-1:2.2.3-63.el5_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.3-63.el5_8.1?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.3-63.el5_8.1.ia64", "product": { "name": "httpd-manual-0:2.2.3-63.el5_8.1.ia64", "product_id": "httpd-manual-0:2.2.3-63.el5_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.3-63.el5_8.1?arch=ia64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-63.el5_8.1.ia64", "product": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.ia64", "product_id": "httpd-devel-0:2.2.3-63.el5_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-63.el5_8.1?arch=ia64" } } }, { "category": "product_version", "name": "httpd-0:2.2.3-63.el5_8.1.ia64", "product": { "name": "httpd-0:2.2.3-63.el5_8.1.ia64", "product_id": "httpd-0:2.2.3-63.el5_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-63.el5_8.1?arch=ia64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "product": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "product_id": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-63.el5_8.1?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.3-63.el5_8.1.ppc", "product": { "name": "mod_ssl-1:2.2.3-63.el5_8.1.ppc", "product_id": "mod_ssl-1:2.2.3-63.el5_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.3-63.el5_8.1?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.3-63.el5_8.1.ppc", "product": { "name": "httpd-manual-0:2.2.3-63.el5_8.1.ppc", "product_id": "httpd-manual-0:2.2.3-63.el5_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.3-63.el5_8.1?arch=ppc" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-63.el5_8.1.ppc", "product": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.ppc", "product_id": "httpd-devel-0:2.2.3-63.el5_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-63.el5_8.1?arch=ppc" } } }, { "category": "product_version", "name": "httpd-0:2.2.3-63.el5_8.1.ppc", "product": { "name": "httpd-0:2.2.3-63.el5_8.1.ppc", "product_id": "httpd-0:2.2.3-63.el5_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-63.el5_8.1?arch=ppc" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "product": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "product_id": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-63.el5_8.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "product": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "product_id": "httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-63.el5_8.1?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "product": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "product_id": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-63.el5_8.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.3-63.el5_8.1.s390x", "product": { "name": "mod_ssl-1:2.2.3-63.el5_8.1.s390x", "product_id": "mod_ssl-1:2.2.3-63.el5_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.3-63.el5_8.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.3-63.el5_8.1.s390x", "product": { "name": "httpd-manual-0:2.2.3-63.el5_8.1.s390x", "product_id": "httpd-manual-0:2.2.3-63.el5_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.3-63.el5_8.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-63.el5_8.1.s390x", "product": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.s390x", "product_id": "httpd-devel-0:2.2.3-63.el5_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-63.el5_8.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-0:2.2.3-63.el5_8.1.s390x", "product": { "name": "httpd-0:2.2.3-63.el5_8.1.s390x", "product_id": "httpd-0:2.2.3-63.el5_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-63.el5_8.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "product": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "product_id": "httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-63.el5_8.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-devel-0:2.2.3-63.el5_8.1.s390", "product": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.s390", "product_id": "httpd-devel-0:2.2.3-63.el5_8.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-63.el5_8.1?arch=s390" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "product": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "product_id": "httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-63.el5_8.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-63.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386" }, "product_reference": "httpd-0:2.2.3-63.el5_8.1.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-63.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64" }, "product_reference": "httpd-0:2.2.3-63.el5_8.1.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-63.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc" }, "product_reference": "httpd-0:2.2.3-63.el5_8.1.ppc", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-63.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x" }, "product_reference": "httpd-0:2.2.3-63.el5_8.1.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-63.el5_8.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src" }, "product_reference": "httpd-0:2.2.3-63.el5_8.1.src", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-63.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64" }, "product_reference": "httpd-0:2.2.3-63.el5_8.1.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.ppc", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.s390", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-63.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386" }, "product_reference": "httpd-manual-0:2.2.3-63.el5_8.1.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-63.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64" }, "product_reference": "httpd-manual-0:2.2.3-63.el5_8.1.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-63.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc" }, "product_reference": "httpd-manual-0:2.2.3-63.el5_8.1.ppc", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-63.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x" }, "product_reference": "httpd-manual-0:2.2.3-63.el5_8.1.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-63.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64" }, "product_reference": "httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-63.el5_8.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386" }, "product_reference": "mod_ssl-1:2.2.3-63.el5_8.1.i386", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-63.el5_8.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64" }, "product_reference": "mod_ssl-1:2.2.3-63.el5_8.1.ia64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-63.el5_8.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc" }, "product_reference": "mod_ssl-1:2.2.3-63.el5_8.1.ppc", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-63.el5_8.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x" }, "product_reference": "mod_ssl-1:2.2.3-63.el5_8.1.s390x", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-63.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64" }, "product_reference": "mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "relates_to_product_reference": "5Client-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-63.el5_8.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386" }, "product_reference": "httpd-0:2.2.3-63.el5_8.1.i386", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-63.el5_8.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64" }, "product_reference": "httpd-0:2.2.3-63.el5_8.1.ia64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-63.el5_8.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc" }, "product_reference": "httpd-0:2.2.3-63.el5_8.1.ppc", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-63.el5_8.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x" }, "product_reference": "httpd-0:2.2.3-63.el5_8.1.s390x", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-63.el5_8.1.src as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src" }, "product_reference": "httpd-0:2.2.3-63.el5_8.1.src", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-63.el5_8.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64" }, "product_reference": "httpd-0:2.2.3-63.el5_8.1.x86_64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.s390 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.i386", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.ia64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.ppc", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.ppc64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.s390 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.s390", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.s390x", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-63.el5_8.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386" }, "product_reference": "httpd-manual-0:2.2.3-63.el5_8.1.i386", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-63.el5_8.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64" }, "product_reference": "httpd-manual-0:2.2.3-63.el5_8.1.ia64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-63.el5_8.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc" }, "product_reference": "httpd-manual-0:2.2.3-63.el5_8.1.ppc", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-63.el5_8.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x" }, "product_reference": "httpd-manual-0:2.2.3-63.el5_8.1.s390x", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-63.el5_8.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64" }, "product_reference": "httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-63.el5_8.1.i386 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386" }, "product_reference": "mod_ssl-1:2.2.3-63.el5_8.1.i386", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-63.el5_8.1.ia64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64" }, "product_reference": "mod_ssl-1:2.2.3-63.el5_8.1.ia64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-63.el5_8.1.ppc as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc" }, "product_reference": "mod_ssl-1:2.2.3-63.el5_8.1.ppc", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-63.el5_8.1.s390x as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x" }, "product_reference": "mod_ssl-1:2.2.3-63.el5_8.1.s390x", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-63.el5_8.1.x86_64 as a component of RHEL Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64" }, "product_reference": "mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "relates_to_product_reference": "5Client-Workstation-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-63.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386" }, "product_reference": "httpd-0:2.2.3-63.el5_8.1.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-63.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64" }, "product_reference": "httpd-0:2.2.3-63.el5_8.1.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-63.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc" }, "product_reference": "httpd-0:2.2.3-63.el5_8.1.ppc", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-63.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x" }, "product_reference": "httpd-0:2.2.3-63.el5_8.1.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-63.el5_8.1.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src" }, "product_reference": "httpd-0:2.2.3-63.el5_8.1.src", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-63.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64" }, "product_reference": "httpd-0:2.2.3-63.el5_8.1.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.ppc", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.s390", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-63.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64" }, "product_reference": "httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-63.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386" }, "product_reference": "httpd-manual-0:2.2.3-63.el5_8.1.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-63.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64" }, "product_reference": "httpd-manual-0:2.2.3-63.el5_8.1.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-63.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc" }, "product_reference": "httpd-manual-0:2.2.3-63.el5_8.1.ppc", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-63.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x" }, "product_reference": "httpd-manual-0:2.2.3-63.el5_8.1.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-63.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64" }, "product_reference": "httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-63.el5_8.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386" }, "product_reference": "mod_ssl-1:2.2.3-63.el5_8.1.i386", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-63.el5_8.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64" }, "product_reference": "mod_ssl-1:2.2.3-63.el5_8.1.ia64", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-63.el5_8.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc" }, "product_reference": "mod_ssl-1:2.2.3-63.el5_8.1.ppc", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-63.el5_8.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x" }, "product_reference": "mod_ssl-1:2.2.3-63.el5_8.1.s390x", "relates_to_product_reference": "5Server-5.8.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-63.el5_8.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64" }, "product_reference": "mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "relates_to_product_reference": "5Server-5.8.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3607", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2011-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "769844" } ], "notes": [ { "category": "description", "text": "Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: ap_pregsub Integer overflow to buffer overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3607" }, { "category": "external", "summary": "RHBZ#769844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=769844" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3607", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3607" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3607", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3607" } ], "release_date": "2011-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-21T21:49:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0323" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: ap_pregsub Integer overflow to buffer overflow" }, { "cve": "CVE-2011-3639", "discovery_date": "2011-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "752080" } ], "notes": [ { "category": "description", "text": "The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: http 0.9 request bypass of the reverse proxy vulnerability CVE-2011-3368 fix", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3639" }, { "category": "external", "summary": "RHBZ#752080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=752080" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3639", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3639" } ], "release_date": "2011-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-21T21:49:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0323" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: http 0.9 request bypass of the reverse proxy vulnerability CVE-2011-3368 fix" }, { "cve": "CVE-2012-0031", "discovery_date": "2012-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "773744" } ], "notes": [ { "category": "description", "text": "scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: possible crash on shutdown due to flaw in scoreboard handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0031" }, { "category": "external", "summary": "RHBZ#773744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=773744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0031", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0031" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0031", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0031" } ], "release_date": "2012-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-21T21:49:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0323" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: possible crash on shutdown due to flaw in scoreboard handling" }, { "cve": "CVE-2012-0053", "discovery_date": "2012-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785069" } ], "notes": [ { "category": "description", "text": "protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: cookie exposure due to error responses", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects httpd packages as shipped with Red Hat Enterprise Linux 3 and 4, which are now in the Extended Life Phase of their life cycle. Therefore this issue is not planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0053" }, { "category": "external", "summary": "RHBZ#785069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785069" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0053", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0053" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0053", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0053" } ], "release_date": "2012-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-21T21:49:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0323" }, { "category": "workaround", "details": "As noted in the original reporter\u0027s advisory (see comment #5), this issue can be mitigated by using a custom ErrorDocument setting, such as:\n\n ErrorDocument 400 \"Bad Request\"\n\n http://httpd.apache.org/docs/2.2/mod/core.html#errordocument\n\nIt should be noted that ErrorDocument setting using path or external URL does not mitigate this issue.\n\n\nIt should also be noted that this is not an issue by itself. This can only be exploited via some other cross-site scripting (XSS) flaw found in a web application running on the server and may allow injected JavaScript to gain access to HttpOnly cookies, if the application uses this protection for its cookies.", "product_ids": [ "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Client-Workstation-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Client-Workstation-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.src", "5Server-5.8.Z:httpd-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-debuginfo-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.ppc64", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-devel-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:httpd-manual-0:2.2.3-63.el5_8.1.x86_64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.i386", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ia64", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.ppc", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.s390x", "5Server-5.8.Z:mod_ssl-1:2.2.3-63.el5_8.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: cookie exposure due to error responses" } ] }
rhsa-2012_0543
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the Apache HTTP Server component for JBoss Enterprise Web\nServer 1.0.2 that fixes multiple security issues and one bug is now\navailable from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The Apache HTTP Server (\"httpd\") is the namesake project of The Apache\nSoftware Foundation.\n\nIt was discovered that the Apache HTTP Server did not properly validate the\nrequest URI for proxied requests. In certain configurations, if a reverse\nproxy used the ProxyPassMatch directive, or if it used the RewriteRule\ndirective with the proxy flag, a remote attacker could make the proxy\nconnect to an arbitrary server, possibly disclosing sensitive information\nfrom internal web servers not directly accessible to the attacker.\n(CVE-2011-3368)\n\nIt was discovered that mod_proxy_ajp incorrectly returned an \"Internal\nServer Error\" response when processing certain malformed HTTP requests,\nwhich caused the back-end server to be marked as failed in configurations\nwhere mod_proxy was used in load balancer mode. A remote attacker could\ncause mod_proxy to not send requests to back-end AJP (Apache JServ\nProtocol) servers for the retry timeout period or until all back-end\nservers were marked as failed. (CVE-2011-3348)\n\nThe httpd server included the full HTTP header line in the default error\npage generated when receiving an excessively long or malformed header.\nMalicious JavaScript running in the server\u0027s domain context could use this\nflaw to gain access to httpOnly cookies. (CVE-2012-0053)\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the way httpd performed substitutions in regular expressions. An\nattacker able to set certain httpd settings, such as a user permitted to\noverride the httpd configuration for a specific directory using a\n\".htaccess\" file, could use this flaw to crash the httpd child process or,\npossibly, execute arbitrary code with the privileges of the \"apache\" user.\n(CVE-2011-3607)\n\nA NULL pointer dereference flaw was found in the httpd mod_log_config\nmodule. In configurations where cookie logging is enabled, a remote\nattacker could use this flaw to crash the httpd child process via an HTTP\nrequest with a malformed Cookie header. (CVE-2012-0021)\n\nA flaw was found in the way httpd handled child process status information.\nA malicious program running with httpd child process privileges (such as a\nPHP or CGI script) could use this flaw to cause the parent httpd process to\ncrash during httpd service shutdown. (CVE-2012-0031)\n\nRed Hat would like to thank Context Information Security for reporting the\nCVE-2011-3368 issue.\n\nThis update also fixes the following bug:\n\n* The fix for CVE-2011-3192 provided by the RHSA-2011:1330 update\nintroduced a regression in the way httpd handled certain Range HTTP header\nvalues. This update corrects this regression. (BZ#749071)\n\nAll users of JBoss Enterprise Web Server 1.0.2 as provided from the Red Hat\nCustomer Portal are advised to apply this update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0543", "url": "https://access.redhat.com/errata/RHSA-2012:0543" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=1.0.2", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=1.0.2" }, { "category": "external", "summary": "https://rhn.redhat.com/errata/RHSA-2011-1330.html", "url": "https://rhn.redhat.com/errata/RHSA-2011-1330.html" }, { "category": "external", "summary": "736690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=736690" }, { "category": "external", "summary": "740045", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=740045" }, { "category": "external", "summary": "769844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=769844" }, { "category": "external", "summary": "773744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=773744" }, { "category": "external", "summary": "785065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785065" }, { "category": "external", "summary": "785069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785069" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0543.json" } ], "title": "Red Hat Security Advisory: httpd security and bug fix update", "tracking": { "current_release_date": "2024-11-05T17:45:31+00:00", "generator": { "date": "2024-11-05T17:45:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2012:0543", "initial_release_date": "2012-05-07T18:16:00+00:00", "revision_history": [ { "date": "2012-05-07T18:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:43:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T17:45:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 1.0", "product": { "name": "Red Hat JBoss Web Server 1.0", "product_id": "Red Hat JBoss Web Server 1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1.0" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3348", "discovery_date": "2011-09-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "736690" } ], "notes": [ { "category": "description", "text": "The mod_proxy_ajp module in the Apache HTTP Server before 2.2.21, when used with mod_proxy_balancer in certain configurations, allows remote attackers to cause a denial of service (temporary \"error state\" in the backend server) via a malformed HTTP request.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_ajp remote temporary DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of httpd as shipped with Red Hat Enterprise Linux 4 and 5 as this flaw was introduced in version 2.2.12.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3348" }, { "category": "external", "summary": "RHBZ#736690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=736690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3348", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3348" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3348", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3348" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_22.html#2.2.21", "url": "http://httpd.apache.org/security/vulnerabilities_22.html#2.2.21" } ], "release_date": "2011-09-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-05-07T18:16:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files).\n\nThe Apache HTTP Server must be restarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0543" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_proxy_ajp remote temporary DoS" }, { "acknowledgments": [ { "names": [ "Context Information Security" ] } ], "cve": "CVE-2011-3368", "discovery_date": "2011-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "740045" } ], "notes": [ { "category": "description", "text": "The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: reverse web proxy vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3368" }, { "category": "external", "summary": "RHBZ#740045", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=740045" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3368", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3368" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3368", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3368" }, { "category": "external", "summary": "http://www.contextis.com/research/blog/reverseproxybypass/", "url": "http://www.contextis.com/research/blog/reverseproxybypass/" } ], "release_date": "2011-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-05-07T18:16:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files).\n\nThe Apache HTTP Server must be restarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0543" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: reverse web proxy vulnerability" }, { "cve": "CVE-2011-3607", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2011-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "769844" } ], "notes": [ { "category": "description", "text": "Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: ap_pregsub Integer overflow to buffer overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3607" }, { "category": "external", "summary": "RHBZ#769844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=769844" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3607", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3607" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3607", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3607" } ], "release_date": "2011-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-05-07T18:16:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files).\n\nThe Apache HTTP Server must be restarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0543" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: ap_pregsub Integer overflow to buffer overflow" }, { "cve": "CVE-2012-0021", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2012-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785065" } ], "notes": [ { "category": "description", "text": "The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference crash in mod_log_config", "title": "Vulnerability summary" }, { "category": "other", "text": "Not vulnerable. This issue did not affect the versions of httpd as shipped with Red Hat Enterprise Linux 4, 5, or 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0021" }, { "category": "external", "summary": "RHBZ#785065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785065" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0021", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0021" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0021", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0021" } ], "release_date": "2011-11-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-05-07T18:16:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files).\n\nThe Apache HTTP Server must be restarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0543" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: NULL pointer dereference crash in mod_log_config" }, { "cve": "CVE-2012-0031", "discovery_date": "2012-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "773744" } ], "notes": [ { "category": "description", "text": "scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: possible crash on shutdown due to flaw in scoreboard handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0031" }, { "category": "external", "summary": "RHBZ#773744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=773744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0031", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0031" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0031", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0031" } ], "release_date": "2012-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-05-07T18:16:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files).\n\nThe Apache HTTP Server must be restarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0543" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: possible crash on shutdown due to flaw in scoreboard handling" }, { "cve": "CVE-2012-0053", "discovery_date": "2012-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785069" } ], "notes": [ { "category": "description", "text": "protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: cookie exposure due to error responses", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects httpd packages as shipped with Red Hat Enterprise Linux 3 and 4, which are now in the Extended Life Phase of their life cycle. Therefore this issue is not planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0053" }, { "category": "external", "summary": "RHBZ#785069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785069" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0053", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0053" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0053", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0053" } ], "release_date": "2012-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-05-07T18:16:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files).\n\nThe Apache HTTP Server must be restarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0543" }, { "category": "workaround", "details": "As noted in the original reporter\u0027s advisory (see comment #5), this issue can be mitigated by using a custom ErrorDocument setting, such as:\n\n ErrorDocument 400 \"Bad Request\"\n\n http://httpd.apache.org/docs/2.2/mod/core.html#errordocument\n\nIt should be noted that ErrorDocument setting using path or external URL does not mitigate this issue.\n\n\nIt should also be noted that this is not an issue by itself. This can only be exploited via some other cross-site scripting (XSS) flaw found in a web application running on the server and may allow injected JavaScript to gain access to HttpOnly cookies, if the application uses this protection for its cookies.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: cookie exposure due to error responses" } ] }
rhsa-2012_0542
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated httpd packages that fix multiple security issues and one bug are\nnow available for JBoss Enterprise Web Server 1.0.2 for Red Hat Enterprise\nLinux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The Apache HTTP Server (\"httpd\") is the namesake project of The Apache\nSoftware Foundation.\n\nIt was discovered that the Apache HTTP Server did not properly validate the\nrequest URI for proxied requests. In certain configurations, if a reverse\nproxy used the ProxyPassMatch directive, or if it used the RewriteRule\ndirective with the proxy flag, a remote attacker could make the proxy\nconnect to an arbitrary server, possibly disclosing sensitive information\nfrom internal web servers not directly accessible to the attacker.\n(CVE-2011-3368)\n\nIt was discovered that mod_proxy_ajp incorrectly returned an \"Internal\nServer Error\" response when processing certain malformed HTTP requests,\nwhich caused the back-end server to be marked as failed in configurations\nwhere mod_proxy was used in load balancer mode. A remote attacker could\ncause mod_proxy to not send requests to back-end AJP (Apache JServ\nProtocol) servers for the retry timeout period or until all back-end\nservers were marked as failed. (CVE-2011-3348)\n\nThe httpd server included the full HTTP header line in the default error\npage generated when receiving an excessively long or malformed header.\nMalicious JavaScript running in the server\u0027s domain context could use this\nflaw to gain access to httpOnly cookies. (CVE-2012-0053)\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the way httpd performed substitutions in regular expressions. An\nattacker able to set certain httpd settings, such as a user permitted to\noverride the httpd configuration for a specific directory using a\n\".htaccess\" file, could use this flaw to crash the httpd child process or,\npossibly, execute arbitrary code with the privileges of the \"apache\" user.\n(CVE-2011-3607)\n\nA NULL pointer dereference flaw was found in the httpd mod_log_config\nmodule. In configurations where cookie logging is enabled, a remote\nattacker could use this flaw to crash the httpd child process via an HTTP\nrequest with a malformed Cookie header. (CVE-2012-0021)\n\nA flaw was found in the way httpd handled child process status information.\nA malicious program running with httpd child process privileges (such as a\nPHP or CGI script) could use this flaw to cause the parent httpd process to\ncrash during httpd service shutdown. (CVE-2012-0031)\n\nRed Hat would like to thank Context Information Security for reporting the\nCVE-2011-3368 issue.\n\nThis update also fixes the following bug:\n\n* The fix for CVE-2011-3192 provided by the RHSA-2011:1329 update\nintroduced a regression in the way httpd handled certain Range HTTP header\nvalues. This update corrects this regression. (BZ#749071)\n\nAll users of JBoss Enterprise Web Server 1.0.2 should upgrade to these\nupdated packages, which contain backported patches to correct these issues.\nAfter installing the updated packages, users must restart the httpd\nservice for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0542", "url": "https://access.redhat.com/errata/RHSA-2012:0542" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://rhn.redhat.com/errata/RHSA-2011-1329.html", "url": "https://rhn.redhat.com/errata/RHSA-2011-1329.html" }, { "category": "external", "summary": "736690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=736690" }, { "category": "external", "summary": "740045", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=740045" }, { "category": "external", "summary": "749071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=749071" }, { "category": "external", "summary": "769844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=769844" }, { "category": "external", "summary": "773744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=773744" }, { "category": "external", "summary": "785065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785065" }, { "category": "external", "summary": "785069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785069" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0542.json" } ], "title": "Red Hat Security Advisory: httpd security and bug fix update", "tracking": { "current_release_date": "2024-11-05T17:45:27+00:00", "generator": { "date": "2024-11-05T17:45:27+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2012:0542", "initial_release_date": "2012-05-07T18:13:00+00:00", "revision_history": [ { "date": "2012-05-07T18:13:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-05-07T18:22:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T17:45:27+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el5" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product": { "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "product": { "name": "httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "product_id": "httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.17-15.4.ep5.el5?arch=i386" } } }, { "category": "product_version", "name": "httpd-0:2.2.17-15.4.ep5.el5.i386", "product": { "name": "httpd-0:2.2.17-15.4.ep5.el5.i386", "product_id": "httpd-0:2.2.17-15.4.ep5.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.17-15.4.ep5.el5?arch=i386" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "product": { "name": "mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "product_id": "mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.17-15.4.ep5.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "product": { "name": "httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "product_id": "httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.17-15.4.ep5.el5?arch=i386" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "product": { "name": "httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "product_id": "httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.17-15.4.ep5.el6?arch=i386" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "product": { "name": "httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "product_id": "httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.17-15.4.ep5.el6?arch=i386" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "product": { "name": "httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "product_id": "httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.17-15.4.ep5.el6?arch=i386" } } }, { "category": "product_version", "name": "httpd-0:2.2.17-15.4.ep5.el6.i386", "product": { "name": "httpd-0:2.2.17-15.4.ep5.el6.i386", "product_id": "httpd-0:2.2.17-15.4.ep5.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.17-15.4.ep5.el6?arch=i386" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "product": { "name": "mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "product_id": "mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.17-15.4.ep5.el6?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "product": { "name": "httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "product_id": "httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.17-15.4.ep5.el5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-0:2.2.17-15.4.ep5.el5.x86_64", "product": { "name": "httpd-0:2.2.17-15.4.ep5.el5.x86_64", "product_id": "httpd-0:2.2.17-15.4.ep5.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.17-15.4.ep5.el5?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "product": { "name": "mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "product_id": "mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.17-15.4.ep5.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "product": { "name": "httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "product_id": "httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.17-15.4.ep5.el5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "product": { "name": "httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "product_id": "httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.17-15.4.ep5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "product": { "name": "httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "product_id": "httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.17-15.4.ep5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "product": { "name": "httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "product_id": "httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.17-15.4.ep5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-0:2.2.17-15.4.ep5.el6.x86_64", "product": { "name": "httpd-0:2.2.17-15.4.ep5.el6.x86_64", "product_id": "httpd-0:2.2.17-15.4.ep5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.17-15.4.ep5.el6?arch=x86_64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64", "product": { "name": "mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64", "product_id": "mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.17-15.4.ep5.el6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.17-15.4.ep5.el5.src", "product": { "name": "httpd-0:2.2.17-15.4.ep5.el5.src", "product_id": "httpd-0:2.2.17-15.4.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.17-15.4.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "httpd-0:2.2.17-15.4.ep5.el6.src", "product": { "name": "httpd-0:2.2.17-15.4.ep5.el6.src", "product_id": "httpd-0:2.2.17-15.4.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.17-15.4.ep5.el6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.17-15.4.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.i386" }, "product_reference": "httpd-0:2.2.17-15.4.ep5.el5.i386", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.17-15.4.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.src" }, "product_reference": "httpd-0:2.2.17-15.4.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.17-15.4.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.x86_64" }, "product_reference": "httpd-0:2.2.17-15.4.ep5.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.17-15.4.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.i386" }, "product_reference": "httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64" }, "product_reference": "httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.17-15.4.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.i386" }, "product_reference": "httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64" }, "product_reference": "httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.17-15.4.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.i386" }, "product_reference": "mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64" }, "product_reference": "mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.17-15.4.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.i386" }, "product_reference": "httpd-0:2.2.17-15.4.ep5.el6.i386", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.17-15.4.ep5.el6.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.src" }, "product_reference": "httpd-0:2.2.17-15.4.ep5.el6.src", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.17-15.4.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.x86_64" }, "product_reference": "httpd-0:2.2.17-15.4.ep5.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.17-15.4.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.i386" }, "product_reference": "httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64" }, "product_reference": "httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.17-15.4.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.i386" }, "product_reference": "httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64" }, "product_reference": "httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.17-15.4.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.i386" }, "product_reference": "httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64" }, "product_reference": "httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.17-15.4.ep5.el6.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.i386" }, "product_reference": "mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "relates_to_product_reference": "6Server-JBEWS-1" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server", "product_id": "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64" }, "product_reference": "mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64", "relates_to_product_reference": "6Server-JBEWS-1" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3348", "discovery_date": "2011-09-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "736690" } ], "notes": [ { "category": "description", "text": "The mod_proxy_ajp module in the Apache HTTP Server before 2.2.21, when used with mod_proxy_balancer in certain configurations, allows remote attackers to cause a denial of service (temporary \"error state\" in the backend server) via a malformed HTTP request.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_proxy_ajp remote temporary DoS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of httpd as shipped with Red Hat Enterprise Linux 4 and 5 as this flaw was introduced in version 2.2.12.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.src", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.src", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3348" }, { "category": "external", "summary": "RHBZ#736690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=736690" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3348", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3348" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3348", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3348" }, { "category": "external", "summary": "http://httpd.apache.org/security/vulnerabilities_22.html#2.2.21", "url": "http://httpd.apache.org/security/vulnerabilities_22.html#2.2.21" } ], "release_date": "2011-09-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-05-07T18:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.src", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.src", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0542" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.src", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.src", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: mod_proxy_ajp remote temporary DoS" }, { "acknowledgments": [ { "names": [ "Context Information Security" ] } ], "cve": "CVE-2011-3368", "discovery_date": "2011-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "740045" } ], "notes": [ { "category": "description", "text": "The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: reverse web proxy vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.src", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.src", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3368" }, { "category": "external", "summary": "RHBZ#740045", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=740045" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3368", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3368" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3368", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3368" }, { "category": "external", "summary": "http://www.contextis.com/research/blog/reverseproxybypass/", "url": "http://www.contextis.com/research/blog/reverseproxybypass/" } ], "release_date": "2011-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-05-07T18:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.src", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.src", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0542" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.src", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.src", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: reverse web proxy vulnerability" }, { "cve": "CVE-2011-3607", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2011-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "769844" } ], "notes": [ { "category": "description", "text": "Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: ap_pregsub Integer overflow to buffer overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.src", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.src", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3607" }, { "category": "external", "summary": "RHBZ#769844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=769844" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3607", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3607" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3607", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3607" } ], "release_date": "2011-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-05-07T18:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.src", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.src", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0542" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.src", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.src", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: ap_pregsub Integer overflow to buffer overflow" }, { "cve": "CVE-2012-0021", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2012-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785065" } ], "notes": [ { "category": "description", "text": "The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: NULL pointer dereference crash in mod_log_config", "title": "Vulnerability summary" }, { "category": "other", "text": "Not vulnerable. This issue did not affect the versions of httpd as shipped with Red Hat Enterprise Linux 4, 5, or 6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.src", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.src", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0021" }, { "category": "external", "summary": "RHBZ#785065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785065" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0021", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0021" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0021", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0021" } ], "release_date": "2011-11-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-05-07T18:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.src", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.src", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0542" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.src", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.src", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: NULL pointer dereference crash in mod_log_config" }, { "cve": "CVE-2012-0031", "discovery_date": "2012-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "773744" } ], "notes": [ { "category": "description", "text": "scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: possible crash on shutdown due to flaw in scoreboard handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.src", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.src", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0031" }, { "category": "external", "summary": "RHBZ#773744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=773744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0031", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0031" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0031", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0031" } ], "release_date": "2012-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-05-07T18:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.src", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.src", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0542" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.src", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.src", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: possible crash on shutdown due to flaw in scoreboard handling" }, { "cve": "CVE-2012-0053", "discovery_date": "2012-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785069" } ], "notes": [ { "category": "description", "text": "protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: cookie exposure due to error responses", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects httpd packages as shipped with Red Hat Enterprise Linux 3 and 4, which are now in the Extended Life Phase of their life cycle. Therefore this issue is not planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.src", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.src", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0053" }, { "category": "external", "summary": "RHBZ#785069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785069" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0053", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0053" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0053", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0053" } ], "release_date": "2012-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-05-07T18:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.src", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.src", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0542" }, { "category": "workaround", "details": "As noted in the original reporter\u0027s advisory (see comment #5), this issue can be mitigated by using a custom ErrorDocument setting, such as:\n\n ErrorDocument 400 \"Bad Request\"\n\n http://httpd.apache.org/docs/2.2/mod/core.html#errordocument\n\nIt should be noted that ErrorDocument setting using path or external URL does not mitigate this issue.\n\n\nIt should also be noted that this is not an issue by itself. This can only be exploited via some other cross-site scripting (XSS) flaw found in a web application running on the server and may allow injected JavaScript to gain access to HttpOnly cookies, if the application uses this protection for its cookies.", "product_ids": [ "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.src", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.src", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.src", "5Server-JBEWS-5.0.0:httpd-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.17-15.4.ep5.el5.x86_64", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.i386", "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.17-15.4.ep5.el5.x86_64", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.src", "6Server-JBEWS-1:httpd-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-devel-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-manual-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:httpd-tools-0:2.2.17-15.4.ep5.el6.x86_64", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.i386", "6Server-JBEWS-1:mod_ssl-1:2.2.17-15.4.ep5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: cookie exposure due to error responses" } ] }
rhsa-2012_0128
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated httpd packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The Apache HTTP Server is a popular web server.\n\nIt was discovered that the fix for CVE-2011-3368 (released via\nRHSA-2011:1391) did not completely address the problem. An attacker could\nbypass the fix and make a reverse proxy connect to an arbitrary server not\ndirectly accessible to the attacker by sending an HTTP version 0.9 request,\nor by using a specially-crafted URI. (CVE-2011-3639, CVE-2011-4317)\n\nThe httpd server included the full HTTP header line in the default error\npage generated when receiving an excessively long or malformed header.\nMalicious JavaScript running in the server\u0027s domain context could use this\nflaw to gain access to httpOnly cookies. (CVE-2012-0053)\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the way httpd performed substitutions in regular expressions. An\nattacker able to set certain httpd settings, such as a user permitted to\noverride the httpd configuration for a specific directory using a\n\".htaccess\" file, could use this flaw to crash the httpd child process or,\npossibly, execute arbitrary code with the privileges of the \"apache\" user.\n(CVE-2011-3607)\n\nA flaw was found in the way httpd handled child process status information.\nA malicious program running with httpd child process privileges (such as a\nPHP or CGI script) could use this flaw to cause the parent httpd process to\ncrash during httpd service shutdown. (CVE-2012-0031)\n\nAll httpd users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, the httpd daemon will be restarted automatically.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0128", "url": "https://access.redhat.com/errata/RHSA-2012:0128" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://rhn.redhat.com/errata/RHSA-2011-1391.html", "url": "https://rhn.redhat.com/errata/RHSA-2011-1391.html" }, { "category": "external", "summary": "752080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=752080" }, { "category": "external", "summary": "756483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=756483" }, { "category": "external", "summary": "769844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=769844" }, { "category": "external", "summary": "773744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=773744" }, { "category": "external", "summary": "785069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785069" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0128.json" } ], "title": "Red Hat Security Advisory: httpd security update", "tracking": { "current_release_date": "2024-11-05T17:42:29+00:00", "generator": { "date": "2024-11-05T17:42:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2012:0128", "initial_release_date": "2012-02-13T20:28:00+00:00", "revision_history": [ { "date": "2012-02-13T20:28:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-02-13T20:33:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T17:42:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "httpd-manual-0:2.2.15-15.el6_2.1.noarch", "product": { "name": "httpd-manual-0:2.2.15-15.el6_2.1.noarch", "product_id": "httpd-manual-0:2.2.15-15.el6_2.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.15-15.el6_2.1?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "product": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "product_id": "mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-15.el6_2.1?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "product": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "product_id": "httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-15.el6_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "product": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "product_id": "httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-15.el6_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "product": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "product_id": "httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-15.el6_2.1?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-0:2.2.15-15.el6_2.1.x86_64", "product": { "name": "httpd-0:2.2.15-15.el6_2.1.x86_64", "product_id": "httpd-0:2.2.15-15.el6_2.1.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-15.el6_2.1?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-devel-0:2.2.15-15.el6_2.1.i686", "product": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.i686", "product_id": "httpd-devel-0:2.2.15-15.el6_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-15.el6_2.1?arch=i686" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "product": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "product_id": "httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-15.el6_2.1?arch=i686" } } }, { "category": "product_version", "name": "httpd-tools-0:2.2.15-15.el6_2.1.i686", "product": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.i686", "product_id": "httpd-tools-0:2.2.15-15.el6_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-15.el6_2.1?arch=i686" } } }, { "category": "product_version", "name": "httpd-0:2.2.15-15.el6_2.1.i686", "product": { "name": "httpd-0:2.2.15-15.el6_2.1.i686", "product_id": "httpd-0:2.2.15-15.el6_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-15.el6_2.1?arch=i686" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.15-15.el6_2.1.i686", "product": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.i686", "product_id": "mod_ssl-1:2.2.15-15.el6_2.1.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-15.el6_2.1?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.15-15.el6_2.1.src", "product": { "name": "httpd-0:2.2.15-15.el6_2.1.src", "product_id": "httpd-0:2.2.15-15.el6_2.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-15.el6_2.1?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "product": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "product_id": "httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-15.el6_2.1?arch=ppc64" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "product": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "product_id": "mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-15.el6_2.1?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "product": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "product_id": "httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-15.el6_2.1?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-0:2.2.15-15.el6_2.1.ppc64", "product": { "name": "httpd-0:2.2.15-15.el6_2.1.ppc64", "product_id": "httpd-0:2.2.15-15.el6_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-15.el6_2.1?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "product": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "product_id": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-15.el6_2.1?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "httpd-devel-0:2.2.15-15.el6_2.1.ppc", "product": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.ppc", "product_id": "httpd-devel-0:2.2.15-15.el6_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-15.el6_2.1?arch=ppc" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "product": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "product_id": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-15.el6_2.1?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "httpd-tools-0:2.2.15-15.el6_2.1.s390x", "product": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.s390x", "product_id": "httpd-tools-0:2.2.15-15.el6_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-tools@2.2.15-15.el6_2.1?arch=s390x" } } }, { "category": "product_version", "name": "mod_ssl-1:2.2.15-15.el6_2.1.s390x", "product": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.s390x", "product_id": "mod_ssl-1:2.2.15-15.el6_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.15-15.el6_2.1?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.15-15.el6_2.1.s390x", "product": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.s390x", "product_id": "httpd-devel-0:2.2.15-15.el6_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-15.el6_2.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-0:2.2.15-15.el6_2.1.s390x", "product": { "name": "httpd-0:2.2.15-15.el6_2.1.s390x", "product_id": "httpd-0:2.2.15-15.el6_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.15-15.el6_2.1?arch=s390x" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "product": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "product_id": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-15.el6_2.1?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-devel-0:2.2.15-15.el6_2.1.s390", "product": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.s390", "product_id": "httpd-devel-0:2.2.15-15.el6_2.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.15-15.el6_2.1?arch=s390" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "product": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "product_id": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.15-15.el6_2.1?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.src" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.src", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.ppc", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.s390 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.s390", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.15-15.el6_2.1.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch" }, "product_reference": "httpd-manual-0:2.2.15-15.el6_2.1.noarch", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6Client-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.src", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.ppc as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.ppc", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.s390 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.s390", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.15-15.el6_2.1.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch" }, "product_reference": "httpd-manual-0:2.2.15-15.el6_2.1.noarch", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6Client-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.src" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.src", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.ppc as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.ppc", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.s390 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.s390", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.15-15.el6_2.1.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch" }, "product_reference": "httpd-manual-0:2.2.15-15.el6_2.1.noarch", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6ComputeNode-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.src", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.ppc as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.ppc", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.s390 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.s390", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.15-15.el6_2.1.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch" }, "product_reference": "httpd-manual-0:2.2.15-15.el6_2.1.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6ComputeNode-optional-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.src" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.src", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.ppc as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.ppc", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.s390 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.s390", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.15-15.el6_2.1.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch" }, "product_reference": "httpd-manual-0:2.2.15-15.el6_2.1.noarch", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6Server-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.src" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.src", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.ppc as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.ppc", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.s390 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.s390", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.15-15.el6_2.1.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch" }, "product_reference": "httpd-manual-0:2.2.15-15.el6_2.1.noarch", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-tools-0:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.i686", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.s390x", "relates_to_product_reference": "6Workstation-6.2.z" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.15-15.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" }, "product_reference": "mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "relates_to_product_reference": "6Workstation-6.2.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-3607", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2011-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "769844" } ], "notes": [ { "category": "description", "text": "Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: ap_pregsub Integer overflow to buffer overflow", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3607" }, { "category": "external", "summary": "RHBZ#769844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=769844" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3607", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3607" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3607", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3607" } ], "release_date": "2011-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-13T20:28:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0128" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: ap_pregsub Integer overflow to buffer overflow" }, { "cve": "CVE-2011-3639", "discovery_date": "2011-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "752080" } ], "notes": [ { "category": "description", "text": "The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: http 0.9 request bypass of the reverse proxy vulnerability CVE-2011-3368 fix", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-3639" }, { "category": "external", "summary": "RHBZ#752080", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=752080" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-3639", "url": "https://www.cve.org/CVERecord?id=CVE-2011-3639" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-3639", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3639" } ], "release_date": "2011-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-13T20:28:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0128" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: http 0.9 request bypass of the reverse proxy vulnerability CVE-2011-3368 fix" }, { "cve": "CVE-2011-4317", "discovery_date": "2011-11-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "756483" } ], "notes": [ { "category": "description", "text": "The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: uri scheme bypass of the reverse proxy vulnerability CVE-2011-3368 fix", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of httpd as shipped with Red Hat Enterprise Linux 4 and 5 due to differences in apr-util\u0027s apr_uri_parse() implementation.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4317" }, { "category": "external", "summary": "RHBZ#756483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=756483" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4317", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4317" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4317", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4317" }, { "category": "external", "summary": "https://community.qualys.com/blogs/securitylabs/2011/11/23/apache-reverse-proxy-bypass-issue", "url": "https://community.qualys.com/blogs/securitylabs/2011/11/23/apache-reverse-proxy-bypass-issue" } ], "release_date": "2011-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-13T20:28:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0128" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: uri scheme bypass of the reverse proxy vulnerability CVE-2011-3368 fix" }, { "cve": "CVE-2012-0031", "discovery_date": "2012-01-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "773744" } ], "notes": [ { "category": "description", "text": "scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: possible crash on shutdown due to flaw in scoreboard handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0031" }, { "category": "external", "summary": "RHBZ#773744", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=773744" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0031", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0031" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0031", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0031" } ], "release_date": "2012-01-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-13T20:28:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0128" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: possible crash on shutdown due to flaw in scoreboard handling" }, { "cve": "CVE-2012-0053", "discovery_date": "2012-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "785069" } ], "notes": [ { "category": "description", "text": "protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: cookie exposure due to error responses", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects httpd packages as shipped with Red Hat Enterprise Linux 3 and 4, which are now in the Extended Life Phase of their life cycle. Therefore this issue is not planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0053" }, { "category": "external", "summary": "RHBZ#785069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785069" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0053", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0053" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0053", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0053" } ], "release_date": "2012-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-02-13T20:28:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0128" }, { "category": "workaround", "details": "As noted in the original reporter\u0027s advisory (see comment #5), this issue can be mitigated by using a custom ErrorDocument setting, such as:\n\n ErrorDocument 400 \"Bad Request\"\n\n http://httpd.apache.org/docs/2.2/mod/core.html#errordocument\n\nIt should be noted that ErrorDocument setting using path or external URL does not mitigate this issue.\n\n\nIt should also be noted that this is not an issue by itself. This can only be exploited via some other cross-site scripting (XSS) flaw found in a web application running on the server and may allow injected JavaScript to gain access to HttpOnly cookies, if the application uses this protection for its cookies.", "product_ids": [ "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Client-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Client-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6ComputeNode-optional-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6ComputeNode-optional-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Server-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Server-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.src", "6Workstation-6.2.z:httpd-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-debuginfo-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-devel-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:httpd-manual-0:2.2.15-15.el6_2.1.noarch", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:httpd-tools-0:2.2.15-15.el6_2.1.x86_64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.i686", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.ppc64", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.s390x", "6Workstation-6.2.z:mod_ssl-1:2.2.15-15.el6_2.1.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: cookie exposure due to error responses" } ] }
var-201111-0190
Vulnerability from variot
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. Apache HTTP Server is prone to a local privilege-escalation vulnerability because of an integer-overflow error. Local attackers can exploit this issue to run arbitrary code with elevated privileges (with the privileges of the Apache webserver process). Failed exploit attempts may crash the affected application, denying service to legitimate users. Note: To trigger this issue, 'mod_setenvif' must be enabled and the attacker should be able to place a malicious '.htaccess' file on the affected webserver. The could allow the attacker to access internal servers that are not otherwise accessible from the outside.
The three CVE ids denote slightly different variants of the same issue.
Note that, even with this issue fixed, it is the responsibility of the administrator to ensure that the regular expression replacement pattern for the target URI does not allow a client to append arbitrary strings to the host or port parts of the target URI. This is a violation of the privilege separation between the apache2 processes and could potentially be used to worsen the impact of other vulnerabilities.
CVE-2012-0053:
The response message for error code 400 (bad request) could be used to expose "httpOnly" cookies. This could allow a remote attacker using cross site scripting to steal authentication cookies.
For the oldstable distribution (lenny), these problems have been fixed in version apache2 2.2.9-10+lenny12.
For the stable distribution (squeeze), these problems have been fixed in version apache2 2.2.16-6+squeeze6
For the testing distribution (wheezy), these problems will be fixed in version 2.2.22-1.
For the unstable distribution (sid), these problems have been fixed in version 2.2.22-1.
We recommend that you upgrade your apache2 packages. The new version number for the oldstable distribution is 2.2.6-02-1+lenny7. In the stable distribution, apache2-mpm-itk has the same version number as apache2. Please review the CVE identifiers referenced below for details.
Impact
A remote attacker might obtain sensitive information, gain privileges, send requests to unintended servers behind proxies, bypass certain security restrictions, obtain the values of HTTPOnly cookies, or cause a Denial of Service in various ways.
A local attacker could gain escalated privileges.
Workaround
There is no known workaround at this time.
Resolution
All Apache HTTP Server users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/apache-2.2.22-r1"
References
[ 1 ] CVE-2010-0408 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0408 [ 2 ] CVE-2010-0434 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0434 [ 3 ] CVE-2010-1452 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1452 [ 4 ] CVE-2010-2791 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2791 [ 5 ] CVE-2011-3192 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3192 [ 6 ] CVE-2011-3348 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3348 [ 7 ] CVE-2011-3368 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3368 [ 8 ] CVE-2011-3607 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3607 [ 9 ] CVE-2011-4317 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4317 [ 10 ] CVE-2012-0021 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0021 [ 11 ] CVE-2012-0031 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0031 [ 12 ] CVE-2012-0053 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0053 [ 13 ] CVE-2012-0883 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0883
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201206-25.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . HP System Management Homepage (SMH) before v7.1.1 running on Linux, Windows and VMware ESX.
It was discovered that the Apache HTTP Server did not properly validate the request URI for proxied requests. (CVE-2011-3368)
It was discovered that mod_proxy_ajp incorrectly returned an "Internal Server Error" response when processing certain malformed HTTP requests, which caused the back-end server to be marked as failed in configurations where mod_proxy was used in load balancer mode. A remote attacker could cause mod_proxy to not send requests to back-end AJP (Apache JServ Protocol) servers for the retry timeout period or until all back-end servers were marked as failed. (CVE-2011-3607)
A NULL pointer dereference flaw was found in the httpd mod_log_config module.
This update also fixes the following bug:
- The fix for CVE-2011-3192 provided by the RHSA-2011:1330 update introduced a regression in the way httpd handled certain Range HTTP header values. This update corrects this regression. Solution:
The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing JBoss Enterprise Web Server installation (including all applications and configuration files). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03517954
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c03517954 Version: 1
HPSBOV02822 SSRT100966 rev.1 - HP Secure Web Server (SWS) for OpenVMS, Remote Denial of Service (DoS), Unauthorized Access, Disclosure of Information
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2012-10-08 Last Updated: 2012-10-08
Potential Security Impact: Remote Denial of Service (DoS), unauthorized access, disclosure of information
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential vulnerabilities have been identified with HP Secure Web Server (SWS) for OpenVMS. The vulnerabilities could be remotely exploited to create a Denial of Service (DoS), unauthorized access, or unauthorized disclosure of information.
References: CVE-2011-0419, CVE-2011-1928, CVE-2011-3192, CVE-2011-3368, CVE-2011-3607, CVE-2011-4317, CVE-2012-0031
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Secure Web Server (SWS) for OpenVMS V2.2 and earlier.
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2011-0419 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2011-1928 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2011-3192 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8 CVE-2011-3368 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0 CVE-2011-3607 (AV:L/AC:M/Au:N/C:P/I:P/A:P) 4.4 CVE-2011-4317 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2012-0031 (AV:L/AC:L/Au:N/C:P/I:P/A:P) 4.6 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has made the following software update available to resolve these vulnerabilities.
HP Secure Web Server (SWS) for OpenVMS V2.2 Update 2 is available at http://h71000.www7.hp.com/openvms/products/ips/apache/csws_patches.html for the following platforms:
Platform Kit Name
OpenVMS Integrity servers HP-I64VMS-CSWS22_UPDATE-V0200--4.PCSI_SFX_I64EXE
OpenVMS Alpha servers CPQ-AXPVMS-CSWS22_UPDATE-V0200--4.PCSI_SFX_AXPEXE
HISTORY Version:1 (rev.1) - 8 October 2012 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c02964430
Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2012 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an \@ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368 (CVE-2011-4317).
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3607 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4317
Updated Packages:
Mandriva Linux 2010.1: 47721c86104358598ddc96c7e93cbdf8 2010.1/i586/apache-base-2.2.15-3.6mdv2010.2.i586.rpm c4029cf90932f6c6d864cc3d91750bca 2010.1/i586/apache-devel-2.2.15-3.6mdv2010.2.i586.rpm 1f9554a4bdb15089b2711b77fe927c61 2010.1/i586/apache-htcacheclean-2.2.15-3.6mdv2010.2.i586.rpm 8d1d86c9b9737d244fde84560718d8e4 2010.1/i586/apache-mod_authn_dbd-2.2.15-3.6mdv2010.2.i586.rpm d33b4789fd1effc6222440d4cd04dd9e 2010.1/i586/apache-mod_cache-2.2.15-3.6mdv2010.2.i586.rpm 634a44c3077bf6b56a19ba2ee367c7ec 2010.1/i586/apache-mod_dav-2.2.15-3.6mdv2010.2.i586.rpm e6d01a8e87b87234c6ac49aa9491aa6f 2010.1/i586/apache-mod_dbd-2.2.15-3.6mdv2010.2.i586.rpm 8a062c3d3255701c066879d4092f70be 2010.1/i586/apache-mod_deflate-2.2.15-3.6mdv2010.2.i586.rpm 9c8a07706f25f84c7fb1deadd948a754 2010.1/i586/apache-mod_disk_cache-2.2.15-3.6mdv2010.2.i586.rpm 8bc3e2eea57fb63efb5b184e11ca8f1b 2010.1/i586/apache-mod_file_cache-2.2.15-3.6mdv2010.2.i586.rpm 498bc63dfedfa9021a0dd91b6ffed359 2010.1/i586/apache-mod_ldap-2.2.15-3.6mdv2010.2.i586.rpm 586c31feb7fb7ca857ef7ee45bf9aebf 2010.1/i586/apache-mod_mem_cache-2.2.15-3.6mdv2010.2.i586.rpm 308a280dc26817b96a6845bc7578c3db 2010.1/i586/apache-mod_proxy-2.2.15-3.6mdv2010.2.i586.rpm 328ac2fe0f4e22d6fe07ae7f70a52fe2 2010.1/i586/apache-mod_proxy_ajp-2.2.15-3.6mdv2010.2.i586.rpm 930c0accae0dd1f5a575d3585c323ac9 2010.1/i586/apache-mod_proxy_scgi-2.2.15-3.6mdv2010.2.i586.rpm 2a5777c4e69db66cc2ae0415aaa0dc9f 2010.1/i586/apache-mod_reqtimeout-2.2.15-3.6mdv2010.2.i586.rpm 66b7801aa2e0c5dca2615ccdafed173e 2010.1/i586/apache-mod_ssl-2.2.15-3.6mdv2010.2.i586.rpm 8d9053f7c60598e3e9fd7a31c2ddaf87 2010.1/i586/apache-modules-2.2.15-3.6mdv2010.2.i586.rpm 8fad2bd2b81936e4d56feac1c7a4a241 2010.1/i586/apache-mod_userdir-2.2.15-3.6mdv2010.2.i586.rpm 12cf47a671ecc70457b74d77da1e976b 2010.1/i586/apache-mpm-event-2.2.15-3.6mdv2010.2.i586.rpm 97f21f06c7a6b92c4c31c97b0f3ab060 2010.1/i586/apache-mpm-itk-2.2.15-3.6mdv2010.2.i586.rpm 17a097d14ee2d2eb8d9f5d4f1b9c1843 2010.1/i586/apache-mpm-peruser-2.2.15-3.6mdv2010.2.i586.rpm 5b488c7767f3c922f36de062e230de3d 2010.1/i586/apache-mpm-prefork-2.2.15-3.6mdv2010.2.i586.rpm 1c8974dfcec0aa5b8d8260c258d6df49 2010.1/i586/apache-mpm-worker-2.2.15-3.6mdv2010.2.i586.rpm f8ed0cb6600be8c3ec1f2b802a7c0eed 2010.1/i586/apache-source-2.2.15-3.6mdv2010.2.i586.rpm 482f8796d668ae703faaf53d3f4c2c7f 2010.1/SRPMS/apache-2.2.15-3.6mdv2010.2.src.rpm
Mandriva Linux 2010.1/X86_64: 04a6488038ca1a84d7e91ce51e4d677f 2010.1/x86_64/apache-base-2.2.15-3.6mdv2010.2.x86_64.rpm 2ba4bd05b46725f127e5b2033fd51667 2010.1/x86_64/apache-devel-2.2.15-3.6mdv2010.2.x86_64.rpm f351ed5721f1b05a6b7dc87ed7aa7a69 2010.1/x86_64/apache-htcacheclean-2.2.15-3.6mdv2010.2.x86_64.rpm 153c76dacd12ef6981827213ec0c8772 2010.1/x86_64/apache-mod_authn_dbd-2.2.15-3.6mdv2010.2.x86_64.rpm 7ed6d7c584fc0eb78303e39ed60b4a73 2010.1/x86_64/apache-mod_cache-2.2.15-3.6mdv2010.2.x86_64.rpm 5a3617389d5a007ecf3dfa4f5ab91b85 2010.1/x86_64/apache-mod_dav-2.2.15-3.6mdv2010.2.x86_64.rpm 93edc8b77815d7cba4373419cb8f5a59 2010.1/x86_64/apache-mod_dbd-2.2.15-3.6mdv2010.2.x86_64.rpm 6e5e5caf00902784efdf13c10939db9d 2010.1/x86_64/apache-mod_deflate-2.2.15-3.6mdv2010.2.x86_64.rpm 4a0347d7d0670c0538d2682dfe9e1e53 2010.1/x86_64/apache-mod_disk_cache-2.2.15-3.6mdv2010.2.x86_64.rpm 8bcc135e98c375d28c3afcd629535a4a 2010.1/x86_64/apache-mod_file_cache-2.2.15-3.6mdv2010.2.x86_64.rpm 214355942ac62028f2697d82906b3920 2010.1/x86_64/apache-mod_ldap-2.2.15-3.6mdv2010.2.x86_64.rpm d9701a16932c1d36f3551fd0ad99ac0f 2010.1/x86_64/apache-mod_mem_cache-2.2.15-3.6mdv2010.2.x86_64.rpm 0514e08540031d1a8fc22420440cf2eb 2010.1/x86_64/apache-mod_proxy-2.2.15-3.6mdv2010.2.x86_64.rpm 564d18314a970303342fa5ef1f5bcd23 2010.1/x86_64/apache-mod_proxy_ajp-2.2.15-3.6mdv2010.2.x86_64.rpm d77370118f402a18bd465508b9ae74c1 2010.1/x86_64/apache-mod_proxy_scgi-2.2.15-3.6mdv2010.2.x86_64.rpm fe3a57456ddb162f53ec86b64aa0f218 2010.1/x86_64/apache-mod_reqtimeout-2.2.15-3.6mdv2010.2.x86_64.rpm b880b8406d1a500a9f4503c06fcfe072 2010.1/x86_64/apache-mod_ssl-2.2.15-3.6mdv2010.2.x86_64.rpm 3392607a02a34b7a53207feb7ed73498 2010.1/x86_64/apache-modules-2.2.15-3.6mdv2010.2.x86_64.rpm f06a2e4cac81365e5c73e365b0f35abe 2010.1/x86_64/apache-mod_userdir-2.2.15-3.6mdv2010.2.x86_64.rpm 3d13698fac6a6dfdafa026b1152a5b1c 2010.1/x86_64/apache-mpm-event-2.2.15-3.6mdv2010.2.x86_64.rpm 16ba47b4fea6f39569be110bbcfaedb6 2010.1/x86_64/apache-mpm-itk-2.2.15-3.6mdv2010.2.x86_64.rpm f24cd380dad81a610d73419eaeb86e04 2010.1/x86_64/apache-mpm-peruser-2.2.15-3.6mdv2010.2.x86_64.rpm d170fad92e75077db15fd802be9deda2 2010.1/x86_64/apache-mpm-prefork-2.2.15-3.6mdv2010.2.x86_64.rpm d967b2e614babf85b3df09589e6978e2 2010.1/x86_64/apache-mpm-worker-2.2.15-3.6mdv2010.2.x86_64.rpm 2c7f977cb7a7494a3e7f020c591b5bea 2010.1/x86_64/apache-source-2.2.15-3.6mdv2010.2.x86_64.rpm 482f8796d668ae703faaf53d3f4c2c7f 2010.1/SRPMS/apache-2.2.15-3.6mdv2010.2.src.rpm
Mandriva Linux 2011: 627e6ab0f50fa35c7a639626e23a38a3 2011/i586/apache-base-2.2.21-0.4-mdv2011.0.i586.rpm f834f9e39003d30ee6d2e2b7b3c6253c 2011/i586/apache-devel-2.2.21-0.4-mdv2011.0.i586.rpm e96cfc5498ea7afca1fe2b22168d3259 2011/i586/apache-htcacheclean-2.2.21-0.4-mdv2011.0.i586.rpm f6700e8a1bc0a6a34b18f5ed091231e3 2011/i586/apache-mod_authn_dbd-2.2.21-0.4-mdv2011.0.i586.rpm 8d37dfd4133c3078702921a517f726b7 2011/i586/apache-mod_cache-2.2.21-0.4-mdv2011.0.i586.rpm 49ce15b00c473c0ff39f54d5741e91a5 2011/i586/apache-mod_dav-2.2.21-0.4-mdv2011.0.i586.rpm 42cb7d2f579c14bfb8682a0b8174603f 2011/i586/apache-mod_dbd-2.2.21-0.4-mdv2011.0.i586.rpm 35fcf3b213505b161067e8ba65cbfe2a 2011/i586/apache-mod_deflate-2.2.21-0.4-mdv2011.0.i586.rpm 2d8ee244d999ddcf58afb5f92de698f4 2011/i586/apache-mod_disk_cache-2.2.21-0.4-mdv2011.0.i586.rpm b2e589ebe2292ea479929203fc3059f2 2011/i586/apache-mod_file_cache-2.2.21-0.4-mdv2011.0.i586.rpm a1506320b89211bd3bbb8f996593e094 2011/i586/apache-mod_ldap-2.2.21-0.4-mdv2011.0.i586.rpm 7ec9927d7efccf86308be53a56c8e1ec 2011/i586/apache-mod_mem_cache-2.2.21-0.4-mdv2011.0.i586.rpm 529d3fdcc50ec7f84e8fd4053d79e939 2011/i586/apache-mod_proxy-2.2.21-0.4-mdv2011.0.i586.rpm dff350fe73e8206df27faf0590062278 2011/i586/apache-mod_proxy_ajp-2.2.21-0.4-mdv2011.0.i586.rpm 91e931c21077f11a1af420edb86c14b4 2011/i586/apache-mod_proxy_scgi-2.2.21-0.4-mdv2011.0.i586.rpm c75091575000eee79711cbc988670d0d 2011/i586/apache-mod_reqtimeout-2.2.21-0.4-mdv2011.0.i586.rpm a3953933158f467b931f77939a8802f5 2011/i586/apache-mod_ssl-2.2.21-0.4-mdv2011.0.i586.rpm 3217a4a46e1b449cfef57e07a487127a 2011/i586/apache-modules-2.2.21-0.4-mdv2011.0.i586.rpm 996837cadafe02b3f3e451c30a81839d 2011/i586/apache-mod_userdir-2.2.21-0.4-mdv2011.0.i586.rpm 35b55759125bc4075676160ec82e6da4 2011/i586/apache-mpm-event-2.2.21-0.4-mdv2011.0.i586.rpm 7f73f3385505743b62016050e18e1d95 2011/i586/apache-mpm-itk-2.2.21-0.4-mdv2011.0.i586.rpm a87bd2119895110b0483548236319418 2011/i586/apache-mpm-peruser-2.2.21-0.4-mdv2011.0.i586.rpm da6507b8694c0d83c697e3438cc14f99 2011/i586/apache-mpm-prefork-2.2.21-0.4-mdv2011.0.i586.rpm 31e5c55aab89b2ac1b8e35d4694a6157 2011/i586/apache-mpm-worker-2.2.21-0.4-mdv2011.0.i586.rpm fc55eb6d0e4c1064b9712f8dfee0c9a2 2011/i586/apache-source-2.2.21-0.4-mdv2011.0.i586.rpm fabc4aa5d999deba6d27c9ada2094dd8 2011/SRPMS/apache-2.2.21-0.4.src.rpm
Mandriva Linux 2011/X86_64: 256f14e15bc11b9f2e117237a0afcecd 2011/x86_64/apache-base-2.2.21-0.4-mdv2011.0.x86_64.rpm 1811331e8129fbb841591ead6d66fb3a 2011/x86_64/apache-devel-2.2.21-0.4-mdv2011.0.x86_64.rpm 2169f3ab56b419e32cdd0c6374280609 2011/x86_64/apache-htcacheclean-2.2.21-0.4-mdv2011.0.x86_64.rpm 3eb90fce534439380f8c200f212b80d1 2011/x86_64/apache-mod_authn_dbd-2.2.21-0.4-mdv2011.0.x86_64.rpm d7e9ccdb75d0f0cd938b11bf0b34ea75 2011/x86_64/apache-mod_cache-2.2.21-0.4-mdv2011.0.x86_64.rpm 22f9c708f1f1a7111306b96f2f7a2f16 2011/x86_64/apache-mod_dav-2.2.21-0.4-mdv2011.0.x86_64.rpm 9006ed39d4482543acbc0a306d1c98b9 2011/x86_64/apache-mod_dbd-2.2.21-0.4-mdv2011.0.x86_64.rpm ac342440d76088ce12784eaec8a04cfd 2011/x86_64/apache-mod_deflate-2.2.21-0.4-mdv2011.0.x86_64.rpm fe98d140fb40902b6e9e8d6209b7ee6e 2011/x86_64/apache-mod_disk_cache-2.2.21-0.4-mdv2011.0.x86_64.rpm 5fddef6bf9280f38f4758840c20500d0 2011/x86_64/apache-mod_file_cache-2.2.21-0.4-mdv2011.0.x86_64.rpm 3035cd294b73d3419a4a8bc911c95b59 2011/x86_64/apache-mod_ldap-2.2.21-0.4-mdv2011.0.x86_64.rpm e045b1f053add604a46b20c0f33654e4 2011/x86_64/apache-mod_mem_cache-2.2.21-0.4-mdv2011.0.x86_64.rpm ecdced72ed663ff13abc879888f2a369 2011/x86_64/apache-mod_proxy-2.2.21-0.4-mdv2011.0.x86_64.rpm 33dbc278cf903e327492485eb93421c0 2011/x86_64/apache-mod_proxy_ajp-2.2.21-0.4-mdv2011.0.x86_64.rpm 668df865cf090bc56386119ffbf69009 2011/x86_64/apache-mod_proxy_scgi-2.2.21-0.4-mdv2011.0.x86_64.rpm f4ffe3b3c6ea342b92f6ff616be3242f 2011/x86_64/apache-mod_reqtimeout-2.2.21-0.4-mdv2011.0.x86_64.rpm 2a459d496bcfda4a902bf5ba160005b0 2011/x86_64/apache-mod_ssl-2.2.21-0.4-mdv2011.0.x86_64.rpm ffefbf2ceabca42e49e3985bb985880f 2011/x86_64/apache-modules-2.2.21-0.4-mdv2011.0.x86_64.rpm d4bfe84a86bd688730666e116df26062 2011/x86_64/apache-mod_userdir-2.2.21-0.4-mdv2011.0.x86_64.rpm 417d6c12ec5d7580ae209a439307e0c1 2011/x86_64/apache-mpm-event-2.2.21-0.4-mdv2011.0.x86_64.rpm 3580eac20ad0954ec9c9e148070cde92 2011/x86_64/apache-mpm-itk-2.2.21-0.4-mdv2011.0.x86_64.rpm 34c074464e9776093c6fd8b0b00d277d 2011/x86_64/apache-mpm-peruser-2.2.21-0.4-mdv2011.0.x86_64.rpm 77fe238e2acd3e9f50a0c6b4e70dbd91 2011/x86_64/apache-mpm-prefork-2.2.21-0.4-mdv2011.0.x86_64.rpm 530632e85e3a1c56aeb5c22b59d51074 2011/x86_64/apache-mpm-worker-2.2.21-0.4-mdv2011.0.x86_64.rpm 54ae3219fe5921167de58e02d1709136 2011/x86_64/apache-source-2.2.21-0.4-mdv2011.0.x86_64.rpm fabc4aa5d999deba6d27c9ada2094dd8 2011/SRPMS/apache-2.2.21-0.4.src.rpm
Mandriva Enterprise Server 5: 694c14ac1aa725219116cf0821bccd4d mes5/i586/apache-base-2.2.9-12.15mdvmes5.2.i586.rpm b78fcfdd2dcba4e1bbb2445850d309a6 mes5/i586/apache-devel-2.2.9-12.15mdvmes5.2.i586.rpm d0df79579e11145dc6222c7be498a08b mes5/i586/apache-htcacheclean-2.2.9-12.15mdvmes5.2.i586.rpm 41bc754f609edd0585e87bfeae433ad0 mes5/i586/apache-mod_authn_dbd-2.2.9-12.15mdvmes5.2.i586.rpm 4ed0091207ac154c47948b14937d8419 mes5/i586/apache-mod_cache-2.2.9-12.15mdvmes5.2.i586.rpm 98ec70cb55cc2d6cfe75e555827e09f6 mes5/i586/apache-mod_dav-2.2.9-12.15mdvmes5.2.i586.rpm 0b57ad40a88d289ff7e93dbee8f7029c mes5/i586/apache-mod_dbd-2.2.9-12.15mdvmes5.2.i586.rpm 60ffbd92bf1c64f9f5d9de84fc1ea3a9 mes5/i586/apache-mod_deflate-2.2.9-12.15mdvmes5.2.i586.rpm 96acedbceae6f50795f5f8eb83bf0894 mes5/i586/apache-mod_disk_cache-2.2.9-12.15mdvmes5.2.i586.rpm 2faa60da5066030c6e1739bcd2e0c186 mes5/i586/apache-mod_file_cache-2.2.9-12.15mdvmes5.2.i586.rpm d8dd234832a23fd7b8fe89b3ab2912ec mes5/i586/apache-mod_ldap-2.2.9-12.15mdvmes5.2.i586.rpm 192b0318fcc0149886d2bf65ca3eb7a0 mes5/i586/apache-mod_mem_cache-2.2.9-12.15mdvmes5.2.i586.rpm c5e14efbac8f535f9d47d71e15210ece mes5/i586/apache-mod_proxy-2.2.9-12.15mdvmes5.2.i586.rpm 86b9b67a3de9e2b3cb90369d74b259eb mes5/i586/apache-mod_proxy_ajp-2.2.9-12.15mdvmes5.2.i586.rpm 23771d89269201a8d41aad22ed7dd9fe mes5/i586/apache-mod_ssl-2.2.9-12.15mdvmes5.2.i586.rpm a9fe76cd2785c8baeb1a4cc24a9e9580 mes5/i586/apache-modules-2.2.9-12.15mdvmes5.2.i586.rpm b156b74e9d0b3f028ec422be7770c61b mes5/i586/apache-mod_userdir-2.2.9-12.15mdvmes5.2.i586.rpm ae57012ad1bfe385be299692f6b70cc1 mes5/i586/apache-mpm-event-2.2.9-12.15mdvmes5.2.i586.rpm 509a7cb7af1ac015b3b383058dc3d460 mes5/i586/apache-mpm-itk-2.2.9-12.15mdvmes5.2.i586.rpm 0f16651ec38ae7d878fe4a2368ee9d54 mes5/i586/apache-mpm-peruser-2.2.9-12.15mdvmes5.2.i586.rpm 7e1c86769e9c7869f0b8636f458ec627 mes5/i586/apache-mpm-prefork-2.2.9-12.15mdvmes5.2.i586.rpm 35ea9692f732f36905a86fb4dba9cdda mes5/i586/apache-mpm-worker-2.2.9-12.15mdvmes5.2.i586.rpm 1a8cac6533373a9fd3faa3b79599c088 mes5/i586/apache-source-2.2.9-12.15mdvmes5.2.i586.rpm d5b6cb92ebf473ba42a32b84fa40f40d mes5/SRPMS/apache-2.2.9-12.15mdvmes5.2.src.rpm
Mandriva Enterprise Server 5/X86_64: 0ae1d7f13adab27acc8b786e95915c14 mes5/x86_64/apache-base-2.2.9-12.15mdvmes5.2.x86_64.rpm 1bd7812000e4f71ddd083300f004e8bd mes5/x86_64/apache-devel-2.2.9-12.15mdvmes5.2.x86_64.rpm 61b1c2004829c09e685e6fbd61ca2714 mes5/x86_64/apache-htcacheclean-2.2.9-12.15mdvmes5.2.x86_64.rpm 26d3fac76d72121901831d7cd38b3633 mes5/x86_64/apache-mod_authn_dbd-2.2.9-12.15mdvmes5.2.x86_64.rpm 4bfcbbc2d949b6c0ff387c1236a26a63 mes5/x86_64/apache-mod_cache-2.2.9-12.15mdvmes5.2.x86_64.rpm 5dfcd153e80849e6eaa29541c06938d9 mes5/x86_64/apache-mod_dav-2.2.9-12.15mdvmes5.2.x86_64.rpm 59ad16a7a1ce24740a10e24b93881225 mes5/x86_64/apache-mod_dbd-2.2.9-12.15mdvmes5.2.x86_64.rpm 7ca4dc330983a90cc76ef05025171c3e mes5/x86_64/apache-mod_deflate-2.2.9-12.15mdvmes5.2.x86_64.rpm 601d5df07381c6e7f4f4ec233d7b130f mes5/x86_64/apache-mod_disk_cache-2.2.9-12.15mdvmes5.2.x86_64.rpm 56a892846f01dc5f354091867b1c11b9 mes5/x86_64/apache-mod_file_cache-2.2.9-12.15mdvmes5.2.x86_64.rpm 3dc34aee1e773bcd1d8104d9102ad65c mes5/x86_64/apache-mod_ldap-2.2.9-12.15mdvmes5.2.x86_64.rpm 2e523ac976afa7e9fbb49851dd7cdbad mes5/x86_64/apache-mod_mem_cache-2.2.9-12.15mdvmes5.2.x86_64.rpm 2a0c71a369a519f2606266df778200cf mes5/x86_64/apache-mod_proxy-2.2.9-12.15mdvmes5.2.x86_64.rpm 8b5695a122649830105b88a62e45dede mes5/x86_64/apache-mod_proxy_ajp-2.2.9-12.15mdvmes5.2.x86_64.rpm c0ad053024a6bbcc1a618639694a4a0b mes5/x86_64/apache-mod_ssl-2.2.9-12.15mdvmes5.2.x86_64.rpm f0eb92fa6a5fd1b70d32965ac32033ff mes5/x86_64/apache-modules-2.2.9-12.15mdvmes5.2.x86_64.rpm 378560cb4256e15405e6786672586239 mes5/x86_64/apache-mod_userdir-2.2.9-12.15mdvmes5.2.x86_64.rpm c5f79fe55502f5fd2e6a80ef22d14cb5 mes5/x86_64/apache-mpm-event-2.2.9-12.15mdvmes5.2.x86_64.rpm 79c9df06193fec61ece2372929da3e72 mes5/x86_64/apache-mpm-itk-2.2.9-12.15mdvmes5.2.x86_64.rpm fad5cd549063827dc78c335162a8b5ab mes5/x86_64/apache-mpm-peruser-2.2.9-12.15mdvmes5.2.x86_64.rpm e691b3fdb827f1f03c92c3bc4265f6ee mes5/x86_64/apache-mpm-prefork-2.2.9-12.15mdvmes5.2.x86_64.rpm 8578c114dea4dd49232a82922d46fbbc mes5/x86_64/apache-mpm-worker-2.2.9-12.15mdvmes5.2.x86_64.rpm 4eba23905fbbd38d24a99f8567304372 mes5/x86_64/apache-source-2.2.9-12.15mdvmes5.2.x86_64.rpm d5b6cb92ebf473ba42a32b84fa40f40d mes5/SRPMS/apache-2.2.9-12.15mdvmes5.2.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: httpd security update Advisory ID: RHSA-2012:0323-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-0323.html Issue date: 2012-02-21 CVE Names: CVE-2011-3607 CVE-2011-3639 CVE-2012-0031 CVE-2012-0053 =====================================================================
- Summary:
Updated httpd packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64
It was discovered that the fix for CVE-2011-3368 (released via RHSA-2011:1392) did not completely address the problem. An attacker could bypass the fix and make a reverse proxy connect to an arbitrary server not directly accessible to the attacker by sending an HTTP version 0.9 request. (CVE-2011-3639)
The httpd server included the full HTTP header line in the default error page generated when receiving an excessively long or malformed header. Malicious JavaScript running in the server's domain context could use this flaw to gain access to httpOnly cookies. (CVE-2012-0053)
An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way httpd performed substitutions in regular expressions. An attacker able to set certain httpd settings, such as a user permitted to override the httpd configuration for a specific directory using a ".htaccess" file, could use this flaw to crash the httpd child process or, possibly, execute arbitrary code with the privileges of the "apache" user. (CVE-2011-3607)
A flaw was found in the way httpd handled child process status information. A malicious program running with httpd child process privileges (such as a PHP or CGI script) could use this flaw to cause the parent httpd process to crash during httpd service shutdown. (CVE-2012-0031)
All httpd users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing the updated packages, the httpd daemon will be restarted automatically.
- Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259
- Package List:
Red Hat Enterprise Linux Desktop (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/httpd-2.2.3-63.el5_8.1.src.rpm
i386: httpd-2.2.3-63.el5_8.1.i386.rpm httpd-debuginfo-2.2.3-63.el5_8.1.i386.rpm mod_ssl-2.2.3-63.el5_8.1.i386.rpm
x86_64: httpd-2.2.3-63.el5_8.1.x86_64.rpm httpd-debuginfo-2.2.3-63.el5_8.1.x86_64.rpm mod_ssl-2.2.3-63.el5_8.1.x86_64.rpm
RHEL Desktop Workstation (v. 5 client):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/httpd-2.2.3-63.el5_8.1.src.rpm
i386: httpd-debuginfo-2.2.3-63.el5_8.1.i386.rpm httpd-devel-2.2.3-63.el5_8.1.i386.rpm httpd-manual-2.2.3-63.el5_8.1.i386.rpm
x86_64: httpd-debuginfo-2.2.3-63.el5_8.1.i386.rpm httpd-debuginfo-2.2.3-63.el5_8.1.x86_64.rpm httpd-devel-2.2.3-63.el5_8.1.i386.rpm httpd-devel-2.2.3-63.el5_8.1.x86_64.rpm httpd-manual-2.2.3-63.el5_8.1.x86_64.rpm
Red Hat Enterprise Linux (v. 5 server):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/httpd-2.2.3-63.el5_8.1.src.rpm
i386: httpd-2.2.3-63.el5_8.1.i386.rpm httpd-debuginfo-2.2.3-63.el5_8.1.i386.rpm httpd-devel-2.2.3-63.el5_8.1.i386.rpm httpd-manual-2.2.3-63.el5_8.1.i386.rpm mod_ssl-2.2.3-63.el5_8.1.i386.rpm
ia64: httpd-2.2.3-63.el5_8.1.ia64.rpm httpd-debuginfo-2.2.3-63.el5_8.1.ia64.rpm httpd-devel-2.2.3-63.el5_8.1.ia64.rpm httpd-manual-2.2.3-63.el5_8.1.ia64.rpm mod_ssl-2.2.3-63.el5_8.1.ia64.rpm
ppc: httpd-2.2.3-63.el5_8.1.ppc.rpm httpd-debuginfo-2.2.3-63.el5_8.1.ppc.rpm httpd-debuginfo-2.2.3-63.el5_8.1.ppc64.rpm httpd-devel-2.2.3-63.el5_8.1.ppc.rpm httpd-devel-2.2.3-63.el5_8.1.ppc64.rpm httpd-manual-2.2.3-63.el5_8.1.ppc.rpm mod_ssl-2.2.3-63.el5_8.1.ppc.rpm
s390x: httpd-2.2.3-63.el5_8.1.s390x.rpm httpd-debuginfo-2.2.3-63.el5_8.1.s390.rpm httpd-debuginfo-2.2.3-63.el5_8.1.s390x.rpm httpd-devel-2.2.3-63.el5_8.1.s390.rpm httpd-devel-2.2.3-63.el5_8.1.s390x.rpm httpd-manual-2.2.3-63.el5_8.1.s390x.rpm mod_ssl-2.2.3-63.el5_8.1.s390x.rpm
x86_64: httpd-2.2.3-63.el5_8.1.x86_64.rpm httpd-debuginfo-2.2.3-63.el5_8.1.i386.rpm httpd-debuginfo-2.2.3-63.el5_8.1.x86_64.rpm httpd-devel-2.2.3-63.el5_8.1.i386.rpm httpd-devel-2.2.3-63.el5_8.1.x86_64.rpm httpd-manual-2.2.3-63.el5_8.1.x86_64.rpm mod_ssl-2.2.3-63.el5_8.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2011-3607.html https://www.redhat.com/security/data/cve/CVE-2011-3639.html https://www.redhat.com/security/data/cve/CVE-2012-0031.html https://www.redhat.com/security/data/cve/CVE-2012-0053.html https://access.redhat.com/security/updates/classification/#moderate https://rhn.redhat.com/errata/RHSA-2011-1392.html
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2012 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux)
iD8DBQFPRBwPXlSAg2UNWIIRAlvJAJ0TMniw4hLPlG+CAhF6cZd3RqTH3QCfVlvK 6HtbvIeYuOnRkg4sqECy22U= =UZwj -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201111-0190", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "http server", "scope": "eq", "trust": 1.6, "vendor": "apache", "version": "2.0.9" }, { "model": "http server", "scope": "eq", "trust": 1.6, "vendor": "apache", "version": "2.0" }, { "model": "http server", "scope": "eq", "trust": 1.6, "vendor": "apache", "version": "2.0.28" }, { "model": "http server", "scope": "eq", "trust": 1.6, "vendor": "apache", "version": "2.0.35" }, { "model": "http server", "scope": "eq", "trust": 1.6, "vendor": "apache", "version": "2.0.34" }, { "model": "http server", "scope": "eq", "trust": 1.6, "vendor": "apache", "version": "2.0.32" }, { "model": "http server", "scope": "eq", "trust": 1.6, "vendor": "apache", "version": "2.0.37" }, { "model": "http server", "scope": "eq", "trust": 1.6, "vendor": "apache", "version": "2.0.36" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.60" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.40" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.2.1" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.38" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.2.14" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.53" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.43" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.59" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.46" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.39" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.63" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.50" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.64" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.2.21" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.2.4" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.2.18" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.58" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.2.11" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.56" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.48" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.2.10" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.54" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.61" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.57" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.49" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.2.12" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.2.16" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.52" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.2.9" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.2.19" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.2.2" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.2.3" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.2.0" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.47" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.2.6" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.51" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.2.13" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.41" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.44" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.2.8" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.42" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.2.15" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.55" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.0.45" }, { "model": "http server", "scope": "eq", "trust": 1.0, "vendor": "apache", "version": "2.2.20" }, { "model": "http server", "scope": "eq", "trust": 0.8, "vendor": "apache", "version": "2.0.x to 2.0.64" }, { "model": "http server", "scope": "eq", "trust": 0.8, "vendor": "apache", "version": "2.2.x to 2.2.21" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.6.8" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.7 to v10.7.4" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.6.8" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.7 to v10.7.4" }, { "model": "http server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "10.1.3.5" }, { "model": "http server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "10.1.3.5.0" }, { "model": "http server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "11.1.1.5" }, { "model": "http server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "11.1.1.6" }, { "model": "http server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "11.1.1.7.0" }, { "model": "http server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "11.1.2.0" }, { "model": "http server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "12.1.2.0" }, { "model": "hp secure web server for openvms", "scope": "lte", "trust": 0.8, "vendor": "hewlett packard", "version": "2.2" }, { "model": "hp system management homepage", "scope": "lt", "trust": 0.8, "vendor": "hewlett packard", "version": "7.1.1" }, { "model": "interstage application server", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "interstage studio", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "interstage web server", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "interstage web server express", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "interstage application server standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.2.18" }, { "model": "aura session manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "interstage studio enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.1" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.0" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.2" }, { "model": "interstage application server plus", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "6.0.2" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "5.0.1" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.1" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.58" }, { "model": "software foundation apache -beta", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.32" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.54" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "interstage apworks modelers-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "6.0" }, { "model": "interstage application server enterprise edition l11", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "5.0" }, { "model": "software foundation apache beta", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.28" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "12.0" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.42" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.2.11" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6.2" }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.28" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.38" }, { "model": "interstage application server plus", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0.1" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "interstage application server plus developer", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.52" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "5" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.63" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.8" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.36" }, { "model": "interstage studio standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.2" }, { "model": "interstage application server plus", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "6.0.1" }, { "model": "interstage application server standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.0" }, { "model": "hat jboss enterprise web server for rhel", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "61.0" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "12.2" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.41" }, { "model": "interstage studio standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.0" }, { "model": "voice portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.2.8" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.9" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.2.15" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.57" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.19" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.11" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.10" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.0" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.15" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "interstage studio enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.0" }, { "model": "linux lts amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2011" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.2.9" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.3" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.59" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.2" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.0.1" }, { "model": "linux lts powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.49" }, { "model": "interstage application server plus", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "5.0.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "hat enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "interstage application server plus developer", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "5.0.1" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.50" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "5.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "hat enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.2.10" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.2.6" }, { "model": "interstage application server standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.0.1" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "software foundation apache -beta", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.34" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.1.8" }, { "model": "linux lts sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.2.5" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.2.16" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.1.4" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux lts i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.64" }, { "model": "interstage application server standard edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "5.0" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "6.0" }, { "model": "hat enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.1" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.60" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.5" }, { "model": "linux -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.1.1" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.51" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.4" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.2.12" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.17" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "interstage application server standard-j edition 9.1.0b", "scope": null, "trust": 0.3, "vendor": "fujitsu", "version": null }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "12.1" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.37" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.1.2" }, { "model": "software foundation apache -beta", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.28" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.0" }, { "model": "freeflow print server 73.b3.61", "scope": null, "trust": 0.3, "vendor": "xerox", "version": null }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.53" }, { "model": "hat jboss enterprise web server for rhel server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "51.0" }, { "model": "interstage apworks modelers-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.35" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "6" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.55" }, { "model": "hat enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.2" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.1.7" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "interstage application server enterprise edition l10b", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "5.0" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "interstage application server plus", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "6.0" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.2" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.56" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.37" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "8.0" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.2" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2011" }, { "model": "interstage application server plus developer", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "6.0" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.39" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "6.0.1" }, { "model": "linux lts lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "8.04" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.32" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.2.21" }, { "model": "http server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.13" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.2" }, { "model": "interstage application server enterprise edition l10", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "5.0" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "http server", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.21" }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "11.04" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "interstage business application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.1.5" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.2" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software foundation apache", "scope": "ne", "trust": 0.3, "vendor": "apache", "version": "2.2.22" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.2.3" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.48" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.45" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "interstage studio standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.1" }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.43" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.47" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "aura experience portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "6.0.2" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "interstage studio enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.1" }, { "model": "interstage application server standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.2" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.46" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "6.0" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.2.2" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0.1" }, { "model": "system management homepage", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.3" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.44" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.40" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "hat enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.3" }, { "model": "hat enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "6" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.2.1" }, { "model": "aura session manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "interstage application server enterprise edition l10a", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "5.0" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.2.14" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.0.61" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.1.3" }, { "model": "interstage application server standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.1" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.1.9" }, { "model": "freeflow print server 73.c0.41", "scope": null, "trust": 0.3, "vendor": "xerox", "version": null }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.2.4" }, { "model": "interstage studio standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.1" }, { "model": "interstage studio standard-j edition b", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.1.0" }, { "model": "linux x86 64", "scope": "eq", "trust": 0.3, "vendor": "slackware", "version": "13.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.7.1" }, { "model": "linux x86 64 -current", "scope": null, "trust": 0.3, "vendor": "slackware", "version": null }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.1.6" }, { "model": "software foundation apache", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "2.2.13" } ], "sources": [ { "db": "BID", "id": "50494" }, { "db": "JVNDB", "id": "JVNDB-2011-002785" }, { "db": "CNNVD", "id": "CNNVD-201111-112" }, { "db": "NVD", "id": "CVE-2011-3607" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.64:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2011-3607" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "halfdog", "sources": [ { "db": "BID", "id": "50494" } ], "trust": 0.3 }, "cve": "CVE-2011-3607", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2011-3607", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2011-3607", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201111-112", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2011-3607", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2011-3607" }, { "db": "JVNDB", "id": "JVNDB-2011-002785" }, { "db": "CNNVD", "id": "CNNVD-201111-112" }, { "db": "NVD", "id": "CVE-2011-3607" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow. Apache HTTP Server is prone to a local privilege-escalation vulnerability because of an integer-overflow error. \nLocal attackers can exploit this issue to run arbitrary code with elevated privileges (with the privileges of the Apache webserver process). Failed exploit attempts may crash the affected application, denying service to legitimate users. \nNote: To trigger this issue, \u0027mod_setenvif\u0027 must be enabled and the attacker should be able to place a malicious \u0027.htaccess\u0027 file on the affected webserver. The could allow the attacker to access internal\n servers that are not otherwise accessible from the outside. \n\n The three CVE ids denote slightly different variants of the same\n issue. \n\n Note that, even with this issue fixed, it is the responsibility of\n the administrator to ensure that the regular expression replacement\n pattern for the target URI does not allow a client to append arbitrary\n strings to the host or port parts of the target URI. This is a violation of the privilege separation\n between the apache2 processes and could potentially be used to worsen\n the impact of other vulnerabilities. \n\nCVE-2012-0053:\n\n The response message for error code 400 (bad request) could be used to\n expose \"httpOnly\" cookies. This could allow a remote attacker using\n cross site scripting to steal authentication cookies. \n\n\nFor the oldstable distribution (lenny), these problems have been fixed in\nversion apache2 2.2.9-10+lenny12. \n\nFor the stable distribution (squeeze), these problems have been fixed in\nversion apache2 2.2.16-6+squeeze6\n\nFor the testing distribution (wheezy), these problems will be fixed in\nversion 2.2.22-1. \n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 2.2.22-1. \n\nWe recommend that you upgrade your apache2 packages. The new version\nnumber for the oldstable distribution is 2.2.6-02-1+lenny7. In the\nstable distribution, apache2-mpm-itk has the same version number as\napache2. \nPlease review the CVE identifiers referenced below for details. \n\nImpact\n======\n\nA remote attacker might obtain sensitive information, gain privileges,\nsend requests to unintended servers behind proxies, bypass certain\nsecurity restrictions, obtain the values of HTTPOnly cookies, or cause\na Denial of Service in various ways. \n\nA local attacker could gain escalated privileges. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Apache HTTP Server users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=www-servers/apache-2.2.22-r1\"\n\nReferences\n==========\n\n[ 1 ] CVE-2010-0408\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0408\n[ 2 ] CVE-2010-0434\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0434\n[ 3 ] CVE-2010-1452\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1452\n[ 4 ] CVE-2010-2791\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2791\n[ 5 ] CVE-2011-3192\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3192\n[ 6 ] CVE-2011-3348\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3348\n[ 7 ] CVE-2011-3368\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3368\n[ 8 ] CVE-2011-3607\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3607\n[ 9 ] CVE-2011-4317\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4317\n[ 10 ] CVE-2012-0021\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0021\n[ 11 ] CVE-2012-0031\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0031\n[ 12 ] CVE-2012-0053\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0053\n[ 13 ] CVE-2012-0883\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0883\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201206-25.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2012 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. \nHP System Management Homepage (SMH) before v7.1.1 running on Linux, Windows\nand VMware ESX. \n\nIt was discovered that the Apache HTTP Server did not properly validate the\nrequest URI for proxied requests. \n(CVE-2011-3368)\n\nIt was discovered that mod_proxy_ajp incorrectly returned an \"Internal\nServer Error\" response when processing certain malformed HTTP requests,\nwhich caused the back-end server to be marked as failed in configurations\nwhere mod_proxy was used in load balancer mode. A remote attacker could\ncause mod_proxy to not send requests to back-end AJP (Apache JServ\nProtocol) servers for the retry timeout period or until all back-end\nservers were marked as failed. \n(CVE-2011-3607)\n\nA NULL pointer dereference flaw was found in the httpd mod_log_config\nmodule. \n\nThis update also fixes the following bug:\n\n* The fix for CVE-2011-3192 provided by the RHSA-2011:1330 update\nintroduced a regression in the way httpd handled certain Range HTTP header\nvalues. This update corrects this regression. Solution:\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c03517954\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c03517954\nVersion: 1\n\nHPSBOV02822 SSRT100966 rev.1 - HP Secure Web Server (SWS) for OpenVMS, Remote\nDenial of Service (DoS), Unauthorized Access, Disclosure of Information\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2012-10-08\nLast Updated: 2012-10-08\n\nPotential Security Impact: Remote Denial of Service (DoS), unauthorized\naccess, disclosure of information\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential vulnerabilities have been identified with HP Secure Web Server\n(SWS) for OpenVMS. The vulnerabilities could be remotely exploited to create\na Denial of Service (DoS), unauthorized access, or unauthorized disclosure of\ninformation. \n\nReferences: CVE-2011-0419, CVE-2011-1928, CVE-2011-3192, CVE-2011-3368,\nCVE-2011-3607, CVE-2011-4317, CVE-2012-0031\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP Secure Web Server (SWS) for OpenVMS V2.2 and earlier. \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2011-0419 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\nCVE-2011-1928 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\nCVE-2011-3192 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8\nCVE-2011-3368 (AV:N/AC:L/Au:N/C:P/I:N/A:N) 5.0\nCVE-2011-3607 (AV:L/AC:M/Au:N/C:P/I:P/A:P) 4.4\nCVE-2011-4317 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\nCVE-2012-0031 (AV:L/AC:L/Au:N/C:P/I:P/A:P) 4.6\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has made the following software update available to resolve these\nvulnerabilities. \n\nHP Secure Web Server (SWS) for OpenVMS V2.2 Update 2 is available at\nhttp://h71000.www7.hp.com/openvms/products/ips/apache/csws_patches.html for\nthe following platforms:\n\nPlatform\n Kit Name\n\nOpenVMS Integrity servers\n HP-I64VMS-CSWS22_UPDATE-V0200--4.PCSI_SFX_I64EXE\n\nOpenVMS Alpha servers\n CPQ-AXPVMS-CSWS22_UPDATE-V0200--4.PCSI_SFX_AXPEXE\n\nHISTORY\nVersion:1 (rev.1) - 8 October 2012 Initial release\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin List: A list of HP Security Bulletins, updated\nperiodically, is contained in HP Security Notice HPSN-2011-001:\nhttps://h20566.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c02964430\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttp://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2012 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits;damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n \n The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42,\n 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision\n 1179239 patch is in place, does not properly interact with use of (1)\n RewriteRule and (2) ProxyPassMatch pattern matches for configuration\n of a reverse proxy, which allows remote attackers to send requests\n to intranet servers via a malformed URI containing an \\@ (at sign)\n character and a : (colon) character in invalid positions. NOTE: this\n vulnerability exists because of an incomplete fix for CVE-2011-3368\n (CVE-2011-4317). \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3607\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4317\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Linux 2010.1:\n 47721c86104358598ddc96c7e93cbdf8 2010.1/i586/apache-base-2.2.15-3.6mdv2010.2.i586.rpm\n c4029cf90932f6c6d864cc3d91750bca 2010.1/i586/apache-devel-2.2.15-3.6mdv2010.2.i586.rpm\n 1f9554a4bdb15089b2711b77fe927c61 2010.1/i586/apache-htcacheclean-2.2.15-3.6mdv2010.2.i586.rpm\n 8d1d86c9b9737d244fde84560718d8e4 2010.1/i586/apache-mod_authn_dbd-2.2.15-3.6mdv2010.2.i586.rpm\n d33b4789fd1effc6222440d4cd04dd9e 2010.1/i586/apache-mod_cache-2.2.15-3.6mdv2010.2.i586.rpm\n 634a44c3077bf6b56a19ba2ee367c7ec 2010.1/i586/apache-mod_dav-2.2.15-3.6mdv2010.2.i586.rpm\n e6d01a8e87b87234c6ac49aa9491aa6f 2010.1/i586/apache-mod_dbd-2.2.15-3.6mdv2010.2.i586.rpm\n 8a062c3d3255701c066879d4092f70be 2010.1/i586/apache-mod_deflate-2.2.15-3.6mdv2010.2.i586.rpm\n 9c8a07706f25f84c7fb1deadd948a754 2010.1/i586/apache-mod_disk_cache-2.2.15-3.6mdv2010.2.i586.rpm\n 8bc3e2eea57fb63efb5b184e11ca8f1b 2010.1/i586/apache-mod_file_cache-2.2.15-3.6mdv2010.2.i586.rpm\n 498bc63dfedfa9021a0dd91b6ffed359 2010.1/i586/apache-mod_ldap-2.2.15-3.6mdv2010.2.i586.rpm\n 586c31feb7fb7ca857ef7ee45bf9aebf 2010.1/i586/apache-mod_mem_cache-2.2.15-3.6mdv2010.2.i586.rpm\n 308a280dc26817b96a6845bc7578c3db 2010.1/i586/apache-mod_proxy-2.2.15-3.6mdv2010.2.i586.rpm\n 328ac2fe0f4e22d6fe07ae7f70a52fe2 2010.1/i586/apache-mod_proxy_ajp-2.2.15-3.6mdv2010.2.i586.rpm\n 930c0accae0dd1f5a575d3585c323ac9 2010.1/i586/apache-mod_proxy_scgi-2.2.15-3.6mdv2010.2.i586.rpm\n 2a5777c4e69db66cc2ae0415aaa0dc9f 2010.1/i586/apache-mod_reqtimeout-2.2.15-3.6mdv2010.2.i586.rpm\n 66b7801aa2e0c5dca2615ccdafed173e 2010.1/i586/apache-mod_ssl-2.2.15-3.6mdv2010.2.i586.rpm\n 8d9053f7c60598e3e9fd7a31c2ddaf87 2010.1/i586/apache-modules-2.2.15-3.6mdv2010.2.i586.rpm\n 8fad2bd2b81936e4d56feac1c7a4a241 2010.1/i586/apache-mod_userdir-2.2.15-3.6mdv2010.2.i586.rpm\n 12cf47a671ecc70457b74d77da1e976b 2010.1/i586/apache-mpm-event-2.2.15-3.6mdv2010.2.i586.rpm\n 97f21f06c7a6b92c4c31c97b0f3ab060 2010.1/i586/apache-mpm-itk-2.2.15-3.6mdv2010.2.i586.rpm\n 17a097d14ee2d2eb8d9f5d4f1b9c1843 2010.1/i586/apache-mpm-peruser-2.2.15-3.6mdv2010.2.i586.rpm\n 5b488c7767f3c922f36de062e230de3d 2010.1/i586/apache-mpm-prefork-2.2.15-3.6mdv2010.2.i586.rpm\n 1c8974dfcec0aa5b8d8260c258d6df49 2010.1/i586/apache-mpm-worker-2.2.15-3.6mdv2010.2.i586.rpm\n f8ed0cb6600be8c3ec1f2b802a7c0eed 2010.1/i586/apache-source-2.2.15-3.6mdv2010.2.i586.rpm \n 482f8796d668ae703faaf53d3f4c2c7f 2010.1/SRPMS/apache-2.2.15-3.6mdv2010.2.src.rpm\n\n Mandriva Linux 2010.1/X86_64:\n 04a6488038ca1a84d7e91ce51e4d677f 2010.1/x86_64/apache-base-2.2.15-3.6mdv2010.2.x86_64.rpm\n 2ba4bd05b46725f127e5b2033fd51667 2010.1/x86_64/apache-devel-2.2.15-3.6mdv2010.2.x86_64.rpm\n f351ed5721f1b05a6b7dc87ed7aa7a69 2010.1/x86_64/apache-htcacheclean-2.2.15-3.6mdv2010.2.x86_64.rpm\n 153c76dacd12ef6981827213ec0c8772 2010.1/x86_64/apache-mod_authn_dbd-2.2.15-3.6mdv2010.2.x86_64.rpm\n 7ed6d7c584fc0eb78303e39ed60b4a73 2010.1/x86_64/apache-mod_cache-2.2.15-3.6mdv2010.2.x86_64.rpm\n 5a3617389d5a007ecf3dfa4f5ab91b85 2010.1/x86_64/apache-mod_dav-2.2.15-3.6mdv2010.2.x86_64.rpm\n 93edc8b77815d7cba4373419cb8f5a59 2010.1/x86_64/apache-mod_dbd-2.2.15-3.6mdv2010.2.x86_64.rpm\n 6e5e5caf00902784efdf13c10939db9d 2010.1/x86_64/apache-mod_deflate-2.2.15-3.6mdv2010.2.x86_64.rpm\n 4a0347d7d0670c0538d2682dfe9e1e53 2010.1/x86_64/apache-mod_disk_cache-2.2.15-3.6mdv2010.2.x86_64.rpm\n 8bcc135e98c375d28c3afcd629535a4a 2010.1/x86_64/apache-mod_file_cache-2.2.15-3.6mdv2010.2.x86_64.rpm\n 214355942ac62028f2697d82906b3920 2010.1/x86_64/apache-mod_ldap-2.2.15-3.6mdv2010.2.x86_64.rpm\n d9701a16932c1d36f3551fd0ad99ac0f 2010.1/x86_64/apache-mod_mem_cache-2.2.15-3.6mdv2010.2.x86_64.rpm\n 0514e08540031d1a8fc22420440cf2eb 2010.1/x86_64/apache-mod_proxy-2.2.15-3.6mdv2010.2.x86_64.rpm\n 564d18314a970303342fa5ef1f5bcd23 2010.1/x86_64/apache-mod_proxy_ajp-2.2.15-3.6mdv2010.2.x86_64.rpm\n d77370118f402a18bd465508b9ae74c1 2010.1/x86_64/apache-mod_proxy_scgi-2.2.15-3.6mdv2010.2.x86_64.rpm\n fe3a57456ddb162f53ec86b64aa0f218 2010.1/x86_64/apache-mod_reqtimeout-2.2.15-3.6mdv2010.2.x86_64.rpm\n b880b8406d1a500a9f4503c06fcfe072 2010.1/x86_64/apache-mod_ssl-2.2.15-3.6mdv2010.2.x86_64.rpm\n 3392607a02a34b7a53207feb7ed73498 2010.1/x86_64/apache-modules-2.2.15-3.6mdv2010.2.x86_64.rpm\n f06a2e4cac81365e5c73e365b0f35abe 2010.1/x86_64/apache-mod_userdir-2.2.15-3.6mdv2010.2.x86_64.rpm\n 3d13698fac6a6dfdafa026b1152a5b1c 2010.1/x86_64/apache-mpm-event-2.2.15-3.6mdv2010.2.x86_64.rpm\n 16ba47b4fea6f39569be110bbcfaedb6 2010.1/x86_64/apache-mpm-itk-2.2.15-3.6mdv2010.2.x86_64.rpm\n f24cd380dad81a610d73419eaeb86e04 2010.1/x86_64/apache-mpm-peruser-2.2.15-3.6mdv2010.2.x86_64.rpm\n d170fad92e75077db15fd802be9deda2 2010.1/x86_64/apache-mpm-prefork-2.2.15-3.6mdv2010.2.x86_64.rpm\n d967b2e614babf85b3df09589e6978e2 2010.1/x86_64/apache-mpm-worker-2.2.15-3.6mdv2010.2.x86_64.rpm\n 2c7f977cb7a7494a3e7f020c591b5bea 2010.1/x86_64/apache-source-2.2.15-3.6mdv2010.2.x86_64.rpm \n 482f8796d668ae703faaf53d3f4c2c7f 2010.1/SRPMS/apache-2.2.15-3.6mdv2010.2.src.rpm\n\n Mandriva Linux 2011:\n 627e6ab0f50fa35c7a639626e23a38a3 2011/i586/apache-base-2.2.21-0.4-mdv2011.0.i586.rpm\n f834f9e39003d30ee6d2e2b7b3c6253c 2011/i586/apache-devel-2.2.21-0.4-mdv2011.0.i586.rpm\n e96cfc5498ea7afca1fe2b22168d3259 2011/i586/apache-htcacheclean-2.2.21-0.4-mdv2011.0.i586.rpm\n f6700e8a1bc0a6a34b18f5ed091231e3 2011/i586/apache-mod_authn_dbd-2.2.21-0.4-mdv2011.0.i586.rpm\n 8d37dfd4133c3078702921a517f726b7 2011/i586/apache-mod_cache-2.2.21-0.4-mdv2011.0.i586.rpm\n 49ce15b00c473c0ff39f54d5741e91a5 2011/i586/apache-mod_dav-2.2.21-0.4-mdv2011.0.i586.rpm\n 42cb7d2f579c14bfb8682a0b8174603f 2011/i586/apache-mod_dbd-2.2.21-0.4-mdv2011.0.i586.rpm\n 35fcf3b213505b161067e8ba65cbfe2a 2011/i586/apache-mod_deflate-2.2.21-0.4-mdv2011.0.i586.rpm\n 2d8ee244d999ddcf58afb5f92de698f4 2011/i586/apache-mod_disk_cache-2.2.21-0.4-mdv2011.0.i586.rpm\n b2e589ebe2292ea479929203fc3059f2 2011/i586/apache-mod_file_cache-2.2.21-0.4-mdv2011.0.i586.rpm\n a1506320b89211bd3bbb8f996593e094 2011/i586/apache-mod_ldap-2.2.21-0.4-mdv2011.0.i586.rpm\n 7ec9927d7efccf86308be53a56c8e1ec 2011/i586/apache-mod_mem_cache-2.2.21-0.4-mdv2011.0.i586.rpm\n 529d3fdcc50ec7f84e8fd4053d79e939 2011/i586/apache-mod_proxy-2.2.21-0.4-mdv2011.0.i586.rpm\n dff350fe73e8206df27faf0590062278 2011/i586/apache-mod_proxy_ajp-2.2.21-0.4-mdv2011.0.i586.rpm\n 91e931c21077f11a1af420edb86c14b4 2011/i586/apache-mod_proxy_scgi-2.2.21-0.4-mdv2011.0.i586.rpm\n c75091575000eee79711cbc988670d0d 2011/i586/apache-mod_reqtimeout-2.2.21-0.4-mdv2011.0.i586.rpm\n a3953933158f467b931f77939a8802f5 2011/i586/apache-mod_ssl-2.2.21-0.4-mdv2011.0.i586.rpm\n 3217a4a46e1b449cfef57e07a487127a 2011/i586/apache-modules-2.2.21-0.4-mdv2011.0.i586.rpm\n 996837cadafe02b3f3e451c30a81839d 2011/i586/apache-mod_userdir-2.2.21-0.4-mdv2011.0.i586.rpm\n 35b55759125bc4075676160ec82e6da4 2011/i586/apache-mpm-event-2.2.21-0.4-mdv2011.0.i586.rpm\n 7f73f3385505743b62016050e18e1d95 2011/i586/apache-mpm-itk-2.2.21-0.4-mdv2011.0.i586.rpm\n a87bd2119895110b0483548236319418 2011/i586/apache-mpm-peruser-2.2.21-0.4-mdv2011.0.i586.rpm\n da6507b8694c0d83c697e3438cc14f99 2011/i586/apache-mpm-prefork-2.2.21-0.4-mdv2011.0.i586.rpm\n 31e5c55aab89b2ac1b8e35d4694a6157 2011/i586/apache-mpm-worker-2.2.21-0.4-mdv2011.0.i586.rpm\n fc55eb6d0e4c1064b9712f8dfee0c9a2 2011/i586/apache-source-2.2.21-0.4-mdv2011.0.i586.rpm \n fabc4aa5d999deba6d27c9ada2094dd8 2011/SRPMS/apache-2.2.21-0.4.src.rpm\n\n Mandriva Linux 2011/X86_64:\n 256f14e15bc11b9f2e117237a0afcecd 2011/x86_64/apache-base-2.2.21-0.4-mdv2011.0.x86_64.rpm\n 1811331e8129fbb841591ead6d66fb3a 2011/x86_64/apache-devel-2.2.21-0.4-mdv2011.0.x86_64.rpm\n 2169f3ab56b419e32cdd0c6374280609 2011/x86_64/apache-htcacheclean-2.2.21-0.4-mdv2011.0.x86_64.rpm\n 3eb90fce534439380f8c200f212b80d1 2011/x86_64/apache-mod_authn_dbd-2.2.21-0.4-mdv2011.0.x86_64.rpm\n d7e9ccdb75d0f0cd938b11bf0b34ea75 2011/x86_64/apache-mod_cache-2.2.21-0.4-mdv2011.0.x86_64.rpm\n 22f9c708f1f1a7111306b96f2f7a2f16 2011/x86_64/apache-mod_dav-2.2.21-0.4-mdv2011.0.x86_64.rpm\n 9006ed39d4482543acbc0a306d1c98b9 2011/x86_64/apache-mod_dbd-2.2.21-0.4-mdv2011.0.x86_64.rpm\n ac342440d76088ce12784eaec8a04cfd 2011/x86_64/apache-mod_deflate-2.2.21-0.4-mdv2011.0.x86_64.rpm\n fe98d140fb40902b6e9e8d6209b7ee6e 2011/x86_64/apache-mod_disk_cache-2.2.21-0.4-mdv2011.0.x86_64.rpm\n 5fddef6bf9280f38f4758840c20500d0 2011/x86_64/apache-mod_file_cache-2.2.21-0.4-mdv2011.0.x86_64.rpm\n 3035cd294b73d3419a4a8bc911c95b59 2011/x86_64/apache-mod_ldap-2.2.21-0.4-mdv2011.0.x86_64.rpm\n e045b1f053add604a46b20c0f33654e4 2011/x86_64/apache-mod_mem_cache-2.2.21-0.4-mdv2011.0.x86_64.rpm\n ecdced72ed663ff13abc879888f2a369 2011/x86_64/apache-mod_proxy-2.2.21-0.4-mdv2011.0.x86_64.rpm\n 33dbc278cf903e327492485eb93421c0 2011/x86_64/apache-mod_proxy_ajp-2.2.21-0.4-mdv2011.0.x86_64.rpm\n 668df865cf090bc56386119ffbf69009 2011/x86_64/apache-mod_proxy_scgi-2.2.21-0.4-mdv2011.0.x86_64.rpm\n f4ffe3b3c6ea342b92f6ff616be3242f 2011/x86_64/apache-mod_reqtimeout-2.2.21-0.4-mdv2011.0.x86_64.rpm\n 2a459d496bcfda4a902bf5ba160005b0 2011/x86_64/apache-mod_ssl-2.2.21-0.4-mdv2011.0.x86_64.rpm\n ffefbf2ceabca42e49e3985bb985880f 2011/x86_64/apache-modules-2.2.21-0.4-mdv2011.0.x86_64.rpm\n d4bfe84a86bd688730666e116df26062 2011/x86_64/apache-mod_userdir-2.2.21-0.4-mdv2011.0.x86_64.rpm\n 417d6c12ec5d7580ae209a439307e0c1 2011/x86_64/apache-mpm-event-2.2.21-0.4-mdv2011.0.x86_64.rpm\n 3580eac20ad0954ec9c9e148070cde92 2011/x86_64/apache-mpm-itk-2.2.21-0.4-mdv2011.0.x86_64.rpm\n 34c074464e9776093c6fd8b0b00d277d 2011/x86_64/apache-mpm-peruser-2.2.21-0.4-mdv2011.0.x86_64.rpm\n 77fe238e2acd3e9f50a0c6b4e70dbd91 2011/x86_64/apache-mpm-prefork-2.2.21-0.4-mdv2011.0.x86_64.rpm\n 530632e85e3a1c56aeb5c22b59d51074 2011/x86_64/apache-mpm-worker-2.2.21-0.4-mdv2011.0.x86_64.rpm\n 54ae3219fe5921167de58e02d1709136 2011/x86_64/apache-source-2.2.21-0.4-mdv2011.0.x86_64.rpm \n fabc4aa5d999deba6d27c9ada2094dd8 2011/SRPMS/apache-2.2.21-0.4.src.rpm\n\n Mandriva Enterprise Server 5:\n 694c14ac1aa725219116cf0821bccd4d mes5/i586/apache-base-2.2.9-12.15mdvmes5.2.i586.rpm\n b78fcfdd2dcba4e1bbb2445850d309a6 mes5/i586/apache-devel-2.2.9-12.15mdvmes5.2.i586.rpm\n d0df79579e11145dc6222c7be498a08b mes5/i586/apache-htcacheclean-2.2.9-12.15mdvmes5.2.i586.rpm\n 41bc754f609edd0585e87bfeae433ad0 mes5/i586/apache-mod_authn_dbd-2.2.9-12.15mdvmes5.2.i586.rpm\n 4ed0091207ac154c47948b14937d8419 mes5/i586/apache-mod_cache-2.2.9-12.15mdvmes5.2.i586.rpm\n 98ec70cb55cc2d6cfe75e555827e09f6 mes5/i586/apache-mod_dav-2.2.9-12.15mdvmes5.2.i586.rpm\n 0b57ad40a88d289ff7e93dbee8f7029c mes5/i586/apache-mod_dbd-2.2.9-12.15mdvmes5.2.i586.rpm\n 60ffbd92bf1c64f9f5d9de84fc1ea3a9 mes5/i586/apache-mod_deflate-2.2.9-12.15mdvmes5.2.i586.rpm\n 96acedbceae6f50795f5f8eb83bf0894 mes5/i586/apache-mod_disk_cache-2.2.9-12.15mdvmes5.2.i586.rpm\n 2faa60da5066030c6e1739bcd2e0c186 mes5/i586/apache-mod_file_cache-2.2.9-12.15mdvmes5.2.i586.rpm\n d8dd234832a23fd7b8fe89b3ab2912ec mes5/i586/apache-mod_ldap-2.2.9-12.15mdvmes5.2.i586.rpm\n 192b0318fcc0149886d2bf65ca3eb7a0 mes5/i586/apache-mod_mem_cache-2.2.9-12.15mdvmes5.2.i586.rpm\n c5e14efbac8f535f9d47d71e15210ece mes5/i586/apache-mod_proxy-2.2.9-12.15mdvmes5.2.i586.rpm\n 86b9b67a3de9e2b3cb90369d74b259eb mes5/i586/apache-mod_proxy_ajp-2.2.9-12.15mdvmes5.2.i586.rpm\n 23771d89269201a8d41aad22ed7dd9fe mes5/i586/apache-mod_ssl-2.2.9-12.15mdvmes5.2.i586.rpm\n a9fe76cd2785c8baeb1a4cc24a9e9580 mes5/i586/apache-modules-2.2.9-12.15mdvmes5.2.i586.rpm\n b156b74e9d0b3f028ec422be7770c61b mes5/i586/apache-mod_userdir-2.2.9-12.15mdvmes5.2.i586.rpm\n ae57012ad1bfe385be299692f6b70cc1 mes5/i586/apache-mpm-event-2.2.9-12.15mdvmes5.2.i586.rpm\n 509a7cb7af1ac015b3b383058dc3d460 mes5/i586/apache-mpm-itk-2.2.9-12.15mdvmes5.2.i586.rpm\n 0f16651ec38ae7d878fe4a2368ee9d54 mes5/i586/apache-mpm-peruser-2.2.9-12.15mdvmes5.2.i586.rpm\n 7e1c86769e9c7869f0b8636f458ec627 mes5/i586/apache-mpm-prefork-2.2.9-12.15mdvmes5.2.i586.rpm\n 35ea9692f732f36905a86fb4dba9cdda mes5/i586/apache-mpm-worker-2.2.9-12.15mdvmes5.2.i586.rpm\n 1a8cac6533373a9fd3faa3b79599c088 mes5/i586/apache-source-2.2.9-12.15mdvmes5.2.i586.rpm \n d5b6cb92ebf473ba42a32b84fa40f40d mes5/SRPMS/apache-2.2.9-12.15mdvmes5.2.src.rpm\n\n Mandriva Enterprise Server 5/X86_64:\n 0ae1d7f13adab27acc8b786e95915c14 mes5/x86_64/apache-base-2.2.9-12.15mdvmes5.2.x86_64.rpm\n 1bd7812000e4f71ddd083300f004e8bd mes5/x86_64/apache-devel-2.2.9-12.15mdvmes5.2.x86_64.rpm\n 61b1c2004829c09e685e6fbd61ca2714 mes5/x86_64/apache-htcacheclean-2.2.9-12.15mdvmes5.2.x86_64.rpm\n 26d3fac76d72121901831d7cd38b3633 mes5/x86_64/apache-mod_authn_dbd-2.2.9-12.15mdvmes5.2.x86_64.rpm\n 4bfcbbc2d949b6c0ff387c1236a26a63 mes5/x86_64/apache-mod_cache-2.2.9-12.15mdvmes5.2.x86_64.rpm\n 5dfcd153e80849e6eaa29541c06938d9 mes5/x86_64/apache-mod_dav-2.2.9-12.15mdvmes5.2.x86_64.rpm\n 59ad16a7a1ce24740a10e24b93881225 mes5/x86_64/apache-mod_dbd-2.2.9-12.15mdvmes5.2.x86_64.rpm\n 7ca4dc330983a90cc76ef05025171c3e mes5/x86_64/apache-mod_deflate-2.2.9-12.15mdvmes5.2.x86_64.rpm\n 601d5df07381c6e7f4f4ec233d7b130f mes5/x86_64/apache-mod_disk_cache-2.2.9-12.15mdvmes5.2.x86_64.rpm\n 56a892846f01dc5f354091867b1c11b9 mes5/x86_64/apache-mod_file_cache-2.2.9-12.15mdvmes5.2.x86_64.rpm\n 3dc34aee1e773bcd1d8104d9102ad65c mes5/x86_64/apache-mod_ldap-2.2.9-12.15mdvmes5.2.x86_64.rpm\n 2e523ac976afa7e9fbb49851dd7cdbad mes5/x86_64/apache-mod_mem_cache-2.2.9-12.15mdvmes5.2.x86_64.rpm\n 2a0c71a369a519f2606266df778200cf mes5/x86_64/apache-mod_proxy-2.2.9-12.15mdvmes5.2.x86_64.rpm\n 8b5695a122649830105b88a62e45dede mes5/x86_64/apache-mod_proxy_ajp-2.2.9-12.15mdvmes5.2.x86_64.rpm\n c0ad053024a6bbcc1a618639694a4a0b mes5/x86_64/apache-mod_ssl-2.2.9-12.15mdvmes5.2.x86_64.rpm\n f0eb92fa6a5fd1b70d32965ac32033ff mes5/x86_64/apache-modules-2.2.9-12.15mdvmes5.2.x86_64.rpm\n 378560cb4256e15405e6786672586239 mes5/x86_64/apache-mod_userdir-2.2.9-12.15mdvmes5.2.x86_64.rpm\n c5f79fe55502f5fd2e6a80ef22d14cb5 mes5/x86_64/apache-mpm-event-2.2.9-12.15mdvmes5.2.x86_64.rpm\n 79c9df06193fec61ece2372929da3e72 mes5/x86_64/apache-mpm-itk-2.2.9-12.15mdvmes5.2.x86_64.rpm\n fad5cd549063827dc78c335162a8b5ab mes5/x86_64/apache-mpm-peruser-2.2.9-12.15mdvmes5.2.x86_64.rpm\n e691b3fdb827f1f03c92c3bc4265f6ee mes5/x86_64/apache-mpm-prefork-2.2.9-12.15mdvmes5.2.x86_64.rpm\n 8578c114dea4dd49232a82922d46fbbc mes5/x86_64/apache-mpm-worker-2.2.9-12.15mdvmes5.2.x86_64.rpm\n 4eba23905fbbd38d24a99f8567304372 mes5/x86_64/apache-source-2.2.9-12.15mdvmes5.2.x86_64.rpm \n d5b6cb92ebf473ba42a32b84fa40f40d mes5/SRPMS/apache-2.2.9-12.15mdvmes5.2.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: httpd security update\nAdvisory ID: RHSA-2012:0323-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://rhn.redhat.com/errata/RHSA-2012-0323.html\nIssue date: 2012-02-21\nCVE Names: CVE-2011-3607 CVE-2011-3639 CVE-2012-0031 \n CVE-2012-0053 \n=====================================================================\n\n1. Summary:\n\nUpdated httpd packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 5. \n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRHEL Desktop Workstation (v. 5 client) - i386, x86_64\nRed Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64\nRed Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64\n\n3. \n\nIt was discovered that the fix for CVE-2011-3368 (released via\nRHSA-2011:1392) did not completely address the problem. An attacker could\nbypass the fix and make a reverse proxy connect to an arbitrary server not\ndirectly accessible to the attacker by sending an HTTP version 0.9 request. \n(CVE-2011-3639)\n\nThe httpd server included the full HTTP header line in the default error\npage generated when receiving an excessively long or malformed header. \nMalicious JavaScript running in the server\u0027s domain context could use this\nflaw to gain access to httpOnly cookies. (CVE-2012-0053)\n\nAn integer overflow flaw, leading to a heap-based buffer overflow, was\nfound in the way httpd performed substitutions in regular expressions. An\nattacker able to set certain httpd settings, such as a user permitted to\noverride the httpd configuration for a specific directory using a\n\".htaccess\" file, could use this flaw to crash the httpd child process or,\npossibly, execute arbitrary code with the privileges of the \"apache\" user. \n(CVE-2011-3607)\n\nA flaw was found in the way httpd handled child process status information. \nA malicious program running with httpd child process privileges (such as a\nPHP or CGI script) could use this flaw to cause the parent httpd process to\ncrash during httpd service shutdown. (CVE-2012-0031)\n\nAll httpd users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, the httpd daemon will be restarted automatically. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\n5. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/httpd-2.2.3-63.el5_8.1.src.rpm\n\ni386:\nhttpd-2.2.3-63.el5_8.1.i386.rpm\nhttpd-debuginfo-2.2.3-63.el5_8.1.i386.rpm\nmod_ssl-2.2.3-63.el5_8.1.i386.rpm\n\nx86_64:\nhttpd-2.2.3-63.el5_8.1.x86_64.rpm\nhttpd-debuginfo-2.2.3-63.el5_8.1.x86_64.rpm\nmod_ssl-2.2.3-63.el5_8.1.x86_64.rpm\n\nRHEL Desktop Workstation (v. 5 client):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/httpd-2.2.3-63.el5_8.1.src.rpm\n\ni386:\nhttpd-debuginfo-2.2.3-63.el5_8.1.i386.rpm\nhttpd-devel-2.2.3-63.el5_8.1.i386.rpm\nhttpd-manual-2.2.3-63.el5_8.1.i386.rpm\n\nx86_64:\nhttpd-debuginfo-2.2.3-63.el5_8.1.i386.rpm\nhttpd-debuginfo-2.2.3-63.el5_8.1.x86_64.rpm\nhttpd-devel-2.2.3-63.el5_8.1.i386.rpm\nhttpd-devel-2.2.3-63.el5_8.1.x86_64.rpm\nhttpd-manual-2.2.3-63.el5_8.1.x86_64.rpm\n\nRed Hat Enterprise Linux (v. 5 server):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/httpd-2.2.3-63.el5_8.1.src.rpm\n\ni386:\nhttpd-2.2.3-63.el5_8.1.i386.rpm\nhttpd-debuginfo-2.2.3-63.el5_8.1.i386.rpm\nhttpd-devel-2.2.3-63.el5_8.1.i386.rpm\nhttpd-manual-2.2.3-63.el5_8.1.i386.rpm\nmod_ssl-2.2.3-63.el5_8.1.i386.rpm\n\nia64:\nhttpd-2.2.3-63.el5_8.1.ia64.rpm\nhttpd-debuginfo-2.2.3-63.el5_8.1.ia64.rpm\nhttpd-devel-2.2.3-63.el5_8.1.ia64.rpm\nhttpd-manual-2.2.3-63.el5_8.1.ia64.rpm\nmod_ssl-2.2.3-63.el5_8.1.ia64.rpm\n\nppc:\nhttpd-2.2.3-63.el5_8.1.ppc.rpm\nhttpd-debuginfo-2.2.3-63.el5_8.1.ppc.rpm\nhttpd-debuginfo-2.2.3-63.el5_8.1.ppc64.rpm\nhttpd-devel-2.2.3-63.el5_8.1.ppc.rpm\nhttpd-devel-2.2.3-63.el5_8.1.ppc64.rpm\nhttpd-manual-2.2.3-63.el5_8.1.ppc.rpm\nmod_ssl-2.2.3-63.el5_8.1.ppc.rpm\n\ns390x:\nhttpd-2.2.3-63.el5_8.1.s390x.rpm\nhttpd-debuginfo-2.2.3-63.el5_8.1.s390.rpm\nhttpd-debuginfo-2.2.3-63.el5_8.1.s390x.rpm\nhttpd-devel-2.2.3-63.el5_8.1.s390.rpm\nhttpd-devel-2.2.3-63.el5_8.1.s390x.rpm\nhttpd-manual-2.2.3-63.el5_8.1.s390x.rpm\nmod_ssl-2.2.3-63.el5_8.1.s390x.rpm\n\nx86_64:\nhttpd-2.2.3-63.el5_8.1.x86_64.rpm\nhttpd-debuginfo-2.2.3-63.el5_8.1.i386.rpm\nhttpd-debuginfo-2.2.3-63.el5_8.1.x86_64.rpm\nhttpd-devel-2.2.3-63.el5_8.1.i386.rpm\nhttpd-devel-2.2.3-63.el5_8.1.x86_64.rpm\nhttpd-manual-2.2.3-63.el5_8.1.x86_64.rpm\nmod_ssl-2.2.3-63.el5_8.1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and \ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2011-3607.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-3639.html\nhttps://www.redhat.com/security/data/cve/CVE-2012-0031.html\nhttps://www.redhat.com/security/data/cve/CVE-2012-0053.html\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://rhn.redhat.com/errata/RHSA-2011-1392.html\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2012 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.4 (GNU/Linux)\n\niD8DBQFPRBwPXlSAg2UNWIIRAlvJAJ0TMniw4hLPlG+CAhF6cZd3RqTH3QCfVlvK\n6HtbvIeYuOnRkg4sqECy22U=\n=UZwj\n-----END PGP SIGNATURE-----\n\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n", "sources": [ { "db": "NVD", "id": "CVE-2011-3607" }, { "db": "JVNDB", "id": "JVNDB-2011-002785" }, { "db": "BID", "id": "50494" }, { "db": "VULMON", "id": "CVE-2011-3607" }, { "db": "PACKETSTORM", "id": "109464" }, { "db": "PACKETSTORM", "id": "114141" }, { "db": "PACKETSTORM", "id": "121573" }, { "db": "PACKETSTORM", "id": "112503" }, { "db": "PACKETSTORM", "id": "117251" }, { "db": "PACKETSTORM", "id": "108537" }, { "db": "PACKETSTORM", "id": "110036" } ], "trust": 2.61 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=41769", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULMON", "id": "CVE-2011-3607" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-3607", "trust": 3.5 }, { "db": "BID", "id": "50494", "trust": 1.9 }, { "db": "SECUNIA", "id": "48551", "trust": 1.6 }, { "db": "SECUNIA", "id": "45793", "trust": 1.6 }, { "db": "SECTRACK", "id": "1026267", "trust": 1.6 }, { "db": "OSVDB", "id": "76744", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2011-002785", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201111-112", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2011-3607", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "109464", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "114141", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "121573", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "112503", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "117251", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "108537", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "110036", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2011-3607" }, { "db": "BID", "id": "50494" }, { "db": "JVNDB", "id": "JVNDB-2011-002785" }, { "db": "PACKETSTORM", "id": "109464" }, { "db": "PACKETSTORM", "id": "114141" }, { "db": "PACKETSTORM", "id": "121573" }, { "db": "PACKETSTORM", "id": "112503" }, { "db": "PACKETSTORM", "id": "117251" }, { "db": "PACKETSTORM", "id": "108537" }, { "db": "PACKETSTORM", "id": "110036" }, { "db": "CNNVD", "id": "CNNVD-201111-112" }, { "db": "NVD", "id": "CVE-2011-3607" } ] }, "id": "VAR-201111-0190", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.19062972666666667 }, "last_update_date": "2024-07-23T20:18:23.378000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Apache httpd 2.0 vulnerabilities", "trust": 0.8, "url": "http://httpd.apache.org/security/vulnerabilities_20.html" }, { "title": "Apache httpd 2.2 vulnerabilities", "trust": 0.8, "url": "http://httpd.apache.org/security/vulnerabilities_22.html" }, { "title": "APPLE-SA-2012-09-19-2", "trust": 0.8, "url": "http://lists.apple.com/archives/security-announce/2012/sep/msg00004.html" }, { "title": "HT5501", "trust": 0.8, "url": "http://support.apple.com/kb/ht5501" }, { "title": "HT5501", "trust": 0.8, "url": "http://support.apple.com/kb/ht5501?viewlocale=ja_jp" }, { "title": "HPSBMU02786 SSRT100877", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03360041" }, { "title": "HPSBOV02822 SSRT100966", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03517954" }, { "title": "Bug #811422", "trust": 0.8, "url": "https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/811422" }, { "title": "Oracle Critical Patch Update Advisory - July 2012", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html" }, { "title": "Text Form of Oracle Critical Patch Update - January 2015 Risk Matrices", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015verbose-1972976.html" }, { "title": "Oracle Critical Patch Update Advisory - January 2015", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "title": "Bug 750935", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=750935" }, { "title": "RHSA-2012:0128", "trust": 0.8, "url": "http://rhn.redhat.com/errata/rhsa-2012-0128.html" }, { "title": "MDVSA-2012:003", "trust": 0.8, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2012:003" }, { "title": "MDVSA-2013:150", "trust": 0.8, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2013:150" }, { "title": "Multiple vulnerabilities in Apache HTTP Server", "trust": 0.8, "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_apache_http3" }, { "title": "January 2015 Critical Patch Update Released", "trust": 0.8, "url": "https://blogs.oracle.com/security/entry/january_2015_critical_patch_update" }, { "title": "CVE-2011-3607 Buffer Overflow vulnerability in Apache HTTP Server", "trust": 0.8, "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2011_3607_buffer_overflow" }, { "title": "Interstage HTTP Server (CVE-2011-3607/ CVE-2012-3499/ CVE-2012-2687/ CVE-2013-1862)", "trust": 0.8, "url": "http://software.fujitsu.com/jp/security/products-fujitsu/solution/interstage_as_201303.html" }, { "title": "Red Hat: Moderate: httpd security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20120323 - security advisory" }, { "title": "Red Hat: Moderate: httpd security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20120542 - security advisory" }, { "title": "Red Hat: Moderate: httpd security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20120128 - security advisory" }, { "title": "Ubuntu Security Notice: apache2 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-1368-1" }, { "title": "Amazon Linux AMI: ALAS-2012-046", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=alas-2012-046" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - January 2015", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=4a692d6d60aa31507cb101702b494c51" }, { "title": "ReconScan", "trust": 0.1, "url": "https://github.com/rolisoft/reconscan " }, { "title": "ReconScan", "trust": 0.1, "url": "https://github.com/gij03/reconscan " }, { "title": "test", "trust": 0.1, "url": "https://github.com/issdp/test " }, { "title": "ReconScan", "trust": 0.1, "url": "https://github.com/kira1111/reconscan " }, { "title": "pigat", "trust": 0.1, "url": "https://github.com/teamssix/pigat " } ], "sources": [ { "db": "VULMON", "id": "CVE-2011-3607" }, { "db": "JVNDB", "id": "JVNDB-2011-002785" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-189", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-002785" }, { "db": "NVD", "id": "CVE-2011-3607" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "http://www.halfdog.net/security/2011/apachemodsetenvifintegeroverflow/demoexploit.html" }, { "trust": 1.7, "url": "http://rhn.redhat.com/errata/rhsa-2012-0543.html" }, { "trust": 1.6, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2012:003" }, { "trust": 1.6, "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html" }, { "trust": 1.6, "url": "http://www.osvdb.org/76744" }, { "trust": 1.6, "url": "http://lists.apple.com/archives/security-announce/2012/sep/msg00004.html" }, { "trust": 1.6, "url": "https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/811422" }, { "trust": 1.6, "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html" }, { "trust": 1.6, "url": "http://marc.info/?l=bugtraq\u0026m=133494237717847\u0026w=2" }, { "trust": 1.6, "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-11/0023.html" }, { "trust": 1.6, "url": "http://support.apple.com/kb/ht5501" }, { "trust": 1.6, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=750935" }, { "trust": 1.6, "url": "http://marc.info/?l=bugtraq\u0026m=133294460209056\u0026w=2" }, { "trust": 1.6, "url": "http://rhn.redhat.com/errata/rhsa-2012-0128.html" }, { "trust": 1.6, "url": "http://securitytracker.com/id?1026267" }, { "trust": 1.6, "url": "http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2" }, { "trust": 1.6, "url": "http://secunia.com/advisories/48551" }, { "trust": 1.6, "url": "http://rhn.redhat.com/errata/rhsa-2012-0542.html" }, { "trust": 1.6, "url": "http://www.debian.org/security/2012/dsa-2405" }, { "trust": 1.6, "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "trust": 1.6, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2013:150" }, { "trust": 1.6, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03360041" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/50494" }, { "trust": 1.6, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71093" }, { "trust": 1.6, "url": "http://secunia.com/advisories/45793" }, { "trust": 1.3, "url": "http://www.halfdog.net/security/2011/apachemodsetenvifintegeroverflow/" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3ccvs.httpd.apache.org%3e" }, { "trust": 1.0, "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3ccvs.httpd.apache.org%3e" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3607" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu381963/index.html" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-3607" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3607" }, { "trust": 0.6, "url": "http://support.avaya.com/css/p8/documents/100158872" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0031" }, { "trust": 0.6, "url": "httpd.apache.org%3e" }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3ccvs." }, { "trust": 0.6, "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3ccvs." }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4317" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0053" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3368" }, { "trust": 0.3, "url": "http://httpd.apache.org/" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg27014506" }, { "trust": 0.3, "url": "https://h20565.www2.hp.com/portal/site/hpsc/template.page/public/kb/docdisplay/?javax.portlet.tpst=ba847bafb2a2d782fcbb0710b053ce01\u0026javax.portlet.prp_ba847bafb2a2d782fcbb0710b053ce01=wsrp-navigational" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1pm50426" }, { "trust": 0.3, "url": "https://support.avaya.com/css/p8/documents/100155944" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100157326" }, { "trust": 0.3, "url": "http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c03231301\u0026ac.admitted=1332965374461.876444892.492883150" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0021" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3639" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3192" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3348" }, { "trust": 0.2, "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.2, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.2, "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2011-3607.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2012-0031.html" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2012-0053.html" }, { "trust": 0.2, "url": "http://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "http://internal-host/$1" }, { "trust": 0.1, "url": "http://internal-host$1" }, { "trust": 0.1, "url": "http://www.debian.org/security/faq" }, { "trust": 0.1, "url": "http://www.debian.org/security/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0434" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2791" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3368" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0031" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0408" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0408" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1452" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1452" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0053" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0883" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3348" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4317" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0021" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3607" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201206-25.xml" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3192" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0883" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0434" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2791" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0036" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2016" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0057" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4078" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1165" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4885" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2834" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1944" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2014" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0830" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4108" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4153" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-1823" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2013" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4415" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4577" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4619" }, { "trust": 0.1, "url": "http://www.hp.com/swpublishing/mtx-ac3d1f80b8dd48b792bfc01a08" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0027" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2012" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2015" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3379" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4576" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2821" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3368.html" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2011-1330.html" }, { "trust": 0.1, "url": "https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?product=webserver\u0026downloadtype=securitypatches\u0026version=1.0.2" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3348.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2012-0021.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0419" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1928" }, { "trust": 0.1, "url": "http://h71000.www7.hp.com/openvms/products/ips/apache/csws_patches.html" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4317" }, { "trust": 0.1, "url": "http://www.mandriva.com/security/advisories" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2012-0323.html" }, { "trust": 0.1, "url": "https://access.redhat.com/kb/docs/doc-11259" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2011-1392.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2011-3639.html" } ], "sources": [ { "db": "BID", "id": "50494" }, { "db": "JVNDB", "id": "JVNDB-2011-002785" }, { "db": "PACKETSTORM", "id": "109464" }, { "db": "PACKETSTORM", "id": "114141" }, { "db": "PACKETSTORM", "id": "121573" }, { "db": "PACKETSTORM", "id": "112503" }, { "db": "PACKETSTORM", "id": "117251" }, { "db": "PACKETSTORM", "id": "108537" }, { "db": "PACKETSTORM", "id": "110036" }, { "db": "CNNVD", "id": "CNNVD-201111-112" }, { "db": "NVD", "id": "CVE-2011-3607" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2011-3607" }, { "db": "BID", "id": "50494" }, { "db": "JVNDB", "id": "JVNDB-2011-002785" }, { "db": "PACKETSTORM", "id": "109464" }, { "db": "PACKETSTORM", "id": "114141" }, { "db": "PACKETSTORM", "id": "121573" }, { "db": "PACKETSTORM", "id": "112503" }, { "db": "PACKETSTORM", "id": "117251" }, { "db": "PACKETSTORM", "id": "108537" }, { "db": "PACKETSTORM", "id": "110036" }, { "db": "CNNVD", "id": "CNNVD-201111-112" }, { "db": "NVD", "id": "CVE-2011-3607" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-11-08T00:00:00", "db": "VULMON", "id": "CVE-2011-3607" }, { "date": "2011-11-02T00:00:00", "db": "BID", "id": "50494" }, { "date": "2011-11-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-002785" }, { "date": "2012-02-07T00:10:33", "db": "PACKETSTORM", "id": "109464" }, { "date": "2012-06-24T23:54:52", "db": "PACKETSTORM", "id": "114141" }, { "date": "2013-05-09T14:44:00", "db": "PACKETSTORM", "id": "121573" }, { "date": "2012-05-07T20:02:40", "db": "PACKETSTORM", "id": "112503" }, { "date": "2012-10-10T02:28:54", "db": "PACKETSTORM", "id": "117251" }, { "date": "2012-01-10T12:12:00", "db": "PACKETSTORM", "id": "108537" }, { "date": "2012-02-22T02:10:49", "db": "PACKETSTORM", "id": "110036" }, { "date": "2011-11-04T00:00:00", "db": "CNNVD", "id": "CNNVD-201111-112" }, { "date": "2011-11-08T11:55:05.693000", "db": "NVD", "id": "CVE-2011-3607" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-06T00:00:00", "db": "VULMON", "id": "CVE-2011-3607" }, { "date": "2015-04-13T20:49:00", "db": "BID", "id": "50494" }, { "date": "2015-01-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-002785" }, { "date": "2021-06-07T00:00:00", "db": "CNNVD", "id": "CNNVD-201111-112" }, { "date": "2023-11-07T02:08:36.747000", "db": "NVD", "id": "CVE-2011-3607" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "50494" }, { "db": "CNNVD", "id": "CNNVD-201111-112" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Apache HTTP Server Integer overflow vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-002785" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "digital error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201111-112" } ], "trust": 0.6 } }
gsd-2011-3607
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2011-3607", "description": "Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.", "id": "GSD-2011-3607", "references": [ "https://www.suse.com/security/cve/CVE-2011-3607.html", "https://www.debian.org/security/2012/dsa-2405", "https://access.redhat.com/errata/RHSA-2012:0543", "https://access.redhat.com/errata/RHSA-2012:0542", "https://access.redhat.com/errata/RHSA-2012:0323", "https://access.redhat.com/errata/RHSA-2012:0128", "https://alas.aws.amazon.com/cve/html/CVE-2011-3607.html", "https://linux.oracle.com/cve/CVE-2011-3607.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2011-3607" ], "details": "Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.", "id": "GSD-2011-3607", "modified": "2023-12-13T01:19:09.386053Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-3607", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "HPSBMU02786", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" }, { "name": "SSRT100966", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2" }, { "name": "https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/811422", "refsource": "CONFIRM", "url": "https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/811422" }, { "name": "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html", "refsource": "MISC", "url": "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html" }, { "name": "RHSA-2012:0543", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0543.html" }, { "name": "HPSBOV02822", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=750935", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=750935" }, { "name": "SSRT100772", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133294460209056\u0026w=2" }, { "name": "RHSA-2012:0128", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0128.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "45793", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45793" }, { "name": "HPSBMU02748", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133294460209056\u0026w=2" }, { "name": "50494", "refsource": "BID", "url": "http://www.securityfocus.com/bid/50494" }, { "name": "RHSA-2012:0542", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-0542.html" }, { "name": "1026267", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1026267" }, { "name": "APPLE-SA-2012-09-19-2", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html" }, { "name": "http://support.apple.com/kb/HT5501", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT5501" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html" }, { "name": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html", "refsource": "CONFIRM", "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html" }, { "name": "20111102 Integer Overflow in Apache ap_pregsub via mod-setenvif", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-11/0023.html" }, { "name": "SSRT100877", "refsource": "HP", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" }, { "name": "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/", "refsource": "MISC", "url": "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/" }, { "name": "76744", "refsource": "OSVDB", "url": "http://www.osvdb.org/76744" }, { "name": "HPSBUX02761", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133494237717847\u0026w=2" }, { "name": "MDVSA-2013:150", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "name": "48551", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/48551" }, { "name": "DSA-2405", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2405" }, { "name": "SSRT100823", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133494237717847\u0026w=2" }, { "name": "apache-http-appregsub-bo(71093)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71093" }, { "name": "MDVSA-2012:003", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:003" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.64:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-3607" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-189" } ] } ] }, "references": { "reference_data": [ { "name": "76744", "refsource": "OSVDB", "tags": [], "url": "http://www.osvdb.org/76744" }, { "name": "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html", "refsource": "MISC", "tags": [ "Exploit" ], "url": "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html" }, { "name": "50494", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/50494" }, { "name": "1026267", "refsource": "SECTRACK", "tags": [], "url": "http://securitytracker.com/id?1026267" }, { "name": "20111102 Integer Overflow in Apache ap_pregsub via mod-setenvif", "refsource": "FULLDISC", "tags": [], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-11/0023.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=750935", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=750935" }, { "name": "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/", "refsource": "MISC", "tags": [ "Exploit" ], "url": "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/" }, { "name": "45793", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45793" }, { "name": "https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/811422", "refsource": "CONFIRM", "tags": [ "Exploit" ], "url": "https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/811422" }, { "name": "MDVSA-2012:003", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:003" }, { "name": "RHSA-2012:0128", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-0128.html" }, { "name": "HPSBMU02786", "refsource": "HP", "tags": [], "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html" }, { "name": "48551", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/48551" }, { "name": "APPLE-SA-2012-09-19-2", "refsource": "APPLE", "tags": [], "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html" }, { "name": "http://support.apple.com/kb/HT5501", "refsource": "CONFIRM", "tags": [], "url": "http://support.apple.com/kb/HT5501" }, { "name": "SSRT100966", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2" }, { "name": "MDVSA-2013:150", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "name": "HPSBUX02761", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=133494237717847\u0026w=2" }, { "name": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html" }, { "name": "apache-http-appregsub-bo(71093)", "refsource": "XF", "tags": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71093" }, { "name": "DSA-2405", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2012/dsa-2405" }, { "name": "RHSA-2012:0543", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-0543.html" }, { "name": "RHSA-2012:0542", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-0542.html" }, { "name": "SSRT100772", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=133294460209056\u0026w=2" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075467 [2/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [], "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "MEDIUM", "userInteractionRequired": true } }, "lastModifiedDate": "2021-06-06T11:15Z", "publishedDate": "2011-11-08T11:55Z" } } }
ghsa-chqj-ghv5-hm5m
Vulnerability from github
Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.
{ "affected": [], "aliases": [ "CVE-2011-3607" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-11-08T11:55:00Z", "severity": "MODERATE" }, "details": "Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.", "id": "GHSA-chqj-ghv5-hm5m", "modified": "2022-05-13T01:09:52Z", "published": "2022-05-13T01:09:52Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3607" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71093" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=750935" }, { "type": "WEB", "url": "https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/811422" }, { "type": "WEB", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2011-11/0023.html" }, { "type": "WEB", "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=133294460209056\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=133494237717847\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=134987041210674\u0026w=2" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-0128.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-0542.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-0543.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/45793" }, { "type": "WEB", "url": "http://secunia.com/advisories/48551" }, { "type": "WEB", "url": "http://securitytracker.com/id?1026267" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT5501" }, { "type": "WEB", "url": "http://www.debian.org/security/2012/dsa-2405" }, { "type": "WEB", "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201303e.html" }, { "type": "WEB", "url": "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow" }, { "type": "WEB", "url": "http://www.halfdog.net/Security/2011/ApacheModSetEnvIfIntegerOverflow/DemoExploit.html" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:003" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:150" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html" }, { "type": "WEB", "url": "http://www.osvdb.org/76744" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/50494" } ], "schema_version": "1.4.0", "severity": [] }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.