[SECURITY] Fedora 10 Update: httpd-2.2.14-1.fc10

updates at fedoraproject.org updates at fedoraproject.org
Thu Dec 10 04:17:40 UTC 2009


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2009-12604
2009-12-04 22:40:20
--------------------------------------------------------------------------------

Name        : httpd
Product     : Fedora 10
Version     : 2.2.14
Release     : 1.fc10
URL         : http://httpd.apache.org/
Summary     : Apache HTTP Server
Description :
The Apache HTTP Server is a powerful, efficient, and extensible
web server.

--------------------------------------------------------------------------------
Update Information:

This update contains the latest stable release of Apache httpd. Three security
fixes are included, along with several minor bug fixes.    A flaw was found in
the way the TLS/SSL (Transport Layer Security/Secure Sockets Layer) protocols
handle session renegotiation. A man-in-the-middle attacker could use this flaw
to prefix arbitrary plain text to a client's session (for example, an HTTPS
connection to a website). This could force the server to process an attacker's
request as if authenticated using the victim's credentials. This update
partially mitigates this flaw for SSL sessions to HTTP servers using mod_ssl by
rejecting client-requested renegotiation. (CVE-2009-3555)    Note: This update
does not fully resolve the issue for HTTPS servers. An attack is still possible
in configurations that require a server-initiated renegotiation    A NULL
pointer dereference flaw was found in the Apache mod_proxy_ftp module. A
malicious FTP server to which requests are being proxied could use this flaw to
crash an httpd child process via a malformed reply to the EPSV or PASV commands,
resulting in a limited denial of service. (CVE-2009-3094)    A second flaw was
found in the Apache mod_proxy_ftp module. In a reverse proxy configuration, a
remote attacker could use this flaw to bypass intended access restrictions by
creating a carefully-crafted HTTP Authorization header, allowing the attacker to
send arbitrary commands to the FTP server. (CVE-2009-3095)    See the upstream
changes file for further information:
http://www.apache.org/dist/httpd/CHANGES_2.2.14
--------------------------------------------------------------------------------
ChangeLog:

* Thu Dec  3 2009 Joe Orton <jorton at redhat.com> - 2.2.14-1
- update to 2.2.14
- Requires(pre): httpd in mod_ssl subpackage (#543275)
- add partial security fix for CVE-2009-3555 (#533125)
- add condrestart in posttrans (#491567)
* Sun Aug 23 2009 Joe Orton <jorton at redhat.com> 2.2.13-1
- update to 2.2.13
- add delaycompress to logrotate config
* Mon Feb  9 2009 Joe Orton <jorton at redhat.com> 2.2.11-2
- update to 2.2.11 (#482960)
- Require apr-util-ldap (#471898)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #521619 - CVE-2009-3094 httpd: NULL pointer defer in mod_proxy_ftp caused by crafted EPSV and PASV reply
        https://bugzilla.redhat.com/show_bug.cgi?id=521619
  [ 2 ] Bug #522209 - CVE-2009-3095 httpd: mod_proxy_ftp FTP command injection via Authorization HTTP header
        https://bugzilla.redhat.com/show_bug.cgi?id=522209
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update httpd' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
http://fedoraproject.org/keys
--------------------------------------------------------------------------------




More information about the Fedora-package-announce mailing list