GLSA: apache

From: Daniel Ahlberg (alizat_private)
Date: Tue Nov 12 2002 - 06:23:31 PST

  • Next message: dong-h0un U: "Remote Buffer Overflow vulnerability in Light HTTPd"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - - --------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT 200211-003
    - - --------------------------------------------------------------------
    
    PACKAGE : apache
    SUMMARY : Cross-Site Scripting Vulnerability
    DATE    : 2002-11-12 14:11 UTC
    EXPLOIT : local
    
    - - --------------------------------------------------------------------
    
    A vulnerability exists in the SSI error pages of Apache 2.0 that 
    involves incorrect filtering of server signature data. 
    The vulnerability could enable an attacker to hijack web sessions, 
    allowing a range of potential compromises on the targeted host.
    
    Read the full advisory at
    http://online.securityfocus.com/archive/1/293791
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    net-www/apache-2.0.42 and earlier update their systems as follows:
    
    emerge rsync
    emerge apache
    emerge clean
    
    - - --------------------------------------------------------------------
    alizat_private - GnuPG key is available at www.gentoo.org/~aliz
    - - --------------------------------------------------------------------
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.7 (GNU/Linux)
    
    iD8DBQE90Q7hfT7nyhUpoZMRArM0AJ4htFFr3gBDW5tga3p02/CAleoK/wCeK8gc
    VMxVJ4+E8XG9wCy81Y1TwOA=
    =wYi6
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Tue Nov 12 2002 - 12:19:02 PST