[USN-1368-1] Apache HTTP Server vulnerabilities

Marc Deslauriers marc.deslauriers at canonical.com
Thu Feb 16 19:53:03 UTC 2012


==========================================================================
Ubuntu Security Notice USN-1368-1
February 16, 2012

apache2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.10
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS

Summary:

Several security issues were fixed in the Apache HTTP Server.

Software Description:
- apache2: Apache HTTP server

Details:

It was discovered that the Apache HTTP Server incorrectly handled the
SetEnvIf .htaccess file directive. An attacker having write access to a
.htaccess file may exploit this to possibly execute arbitrary code.
(CVE-2011-3607)

Prutha Parikh discovered that the mod_proxy module did not properly
interact with the RewriteRule and ProxyPassMatch pattern matches in the
configuration of a reverse proxy. This could allow remote attackers to
contact internal webservers behind the proxy that were not intended for
external exposure. (CVE-2011-4317)

Rainer Canavan discovered that the mod_log_config module incorrectly
handled a certain format string when used with a threaded MPM. A remote
attacker could exploit this to cause a denial of service via a specially-
crafted cookie. This issue only affected Ubuntu 11.04 and 11.10.
(CVE-2012-0021)

It was discovered that the Apache HTTP Server incorrectly handled certain
type fields within a scoreboard shared memory segment. A local attacker
could exploit this to to cause a denial of service. (CVE-2012-0031)

Norman Hippert discovered that the Apache HTTP Server incorrecly handled
header information when returning a Bad Request (400) error page. A remote
attacker could exploit this to obtain the values of certain HTTPOnly
cookies. (CVE-2012-0053)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 11.10:
  apache2.2-common                2.2.20-1ubuntu1.2

Ubuntu 11.04:
  apache2.2-common                2.2.17-1ubuntu1.5

Ubuntu 10.10:
  apache2.2-common                2.2.16-1ubuntu3.5

Ubuntu 10.04 LTS:
  apache2.2-common                2.2.14-5ubuntu8.8

Ubuntu 8.04 LTS:
  apache2.2-common                2.2.8-1ubuntu0.23

In general, a standard system update will make all the necessary changes.

References:
  http://www.ubuntu.com/usn/usn-1368-1
  CVE-2011-3607, CVE-2011-4317, CVE-2012-0021, CVE-2012-0031,
  CVE-2012-0053

Package Information:
  https://launchpad.net/ubuntu/+source/apache2/2.2.20-1ubuntu1.2
  https://launchpad.net/ubuntu/+source/apache2/2.2.17-1ubuntu1.5
  https://launchpad.net/ubuntu/+source/apache2/2.2.16-1ubuntu3.5
  https://launchpad.net/ubuntu/+source/apache2/2.2.14-5ubuntu8.8
  https://launchpad.net/ubuntu/+source/apache2/2.2.8-1ubuntu0.23


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: This is a digitally signed message part
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20120216/aa25a1bd/attachment.pgp>


More information about the ubuntu-security-announce mailing list