[USN-2299-1] Apache HTTP Server vulnerabilities
Marc Deslauriers
marc.deslauriers at canonical.com
Wed Jul 23 20:29:08 UTC 2014
==========================================================================
Ubuntu Security Notice USN-2299-1
July 23, 2014
apache2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS
Summary:
Several security issues were fixed in Apache HTTP Server.
Software Description:
- apache2: Apache HTTP server
Details:
Marek Kroemeke discovered that the mod_proxy module incorrectly handled
certain requests. A remote attacker could use this issue to cause the
server to stop responding, leading to a denial of service. This issue only
affected Ubuntu 14.04 LTS. (CVE-2014-0117)
Giancarlo Pellegrino and Davide Balzarotti discovered that the mod_deflate
module incorrectly handled body decompression. A remote attacker could use
this issue to cause resource consumption, leading to a denial of service.
(CVE-2014-0118)
Marek Kroemeke and others discovered that the mod_status module incorrectly
handled certain requests. A remote attacker could use this issue to cause
the server to stop responding, leading to a denial of service, or possibly
execute arbitrary code. (CVE-2014-0226)
Rainer Jung discovered that the mod_cgid module incorrectly handled certain
scripts. A remote attacker could use this issue to cause the server to stop
responding, leading to a denial of service. (CVE-2014-0231)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
apache2-bin 2.4.7-1ubuntu4.1
Ubuntu 12.04 LTS:
apache2.2-bin 2.2.22-1ubuntu1.7
Ubuntu 10.04 LTS:
apache2.2-bin 2.2.14-5ubuntu8.14
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2299-1
CVE-2014-0117, CVE-2014-0118, CVE-2014-0226, CVE-2014-0231
Package Information:
https://launchpad.net/ubuntu/+source/apache2/2.4.7-1ubuntu4.1
https://launchpad.net/ubuntu/+source/apache2/2.2.22-1ubuntu1.7
https://launchpad.net/ubuntu/+source/apache2/2.2.14-5ubuntu8.14
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20140723/185a0e5d/attachment.sig>
More information about the ubuntu-security-announce
mailing list