[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[RHSA-2008:0627-01] Low: Red Hat Network Proxy Server security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: Red Hat Network Proxy Server security update
Advisory ID:       RHSA-2008:0627-01
Product:           Red Hat Network Proxy Server
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2008-0627.html
Issue date:        2008-08-13
CVE Names:         CVE-2007-1349 
=====================================================================

1. Summary:

Red Hat Network Proxy Server version 5.1.1 is now available. This update
includes a fix for a security issue in a Red Hat Network Proxy Server
component.

This update has been rated as having low security impact by the Red Hat
Security Response Team.

2. Relevant releases/architectures:

Red Hat Network Proxy v 5.1 (RHEL v.4 AS) - i386, s390, s390x, x86_64

3. Description:

The Red Hat Network Proxy Server 5.1.1 release corrects a security
vulnerability in a shipped component. In a typical operating environment,
this component is not exposed to users of Proxy Server in a vulnerable
manner. This security update will reduce risk in unique Proxy Server
environments.

A flaw was found in the mod_perl "ModPerl::RegistryCooker" class. If a
server implemented a mod_perl registry module using the
"namespace_from_uri" method, a remote attacker requesting a carefully
crafted URI can cause resource consumption, which could lead to a denial of
service. (CVE-2007-1349)

Users of Red Hat Network Proxy Server 5.1 are advised to upgrade to 5.1.1,
which resolves this issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network.  Details on how to use 
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

5. Bugs fixed (http://bugzilla.redhat.com/):

240423 - CVE-2007-1349 mod_perl PerlRun denial of service

6. Package List:

Red Hat Network Proxy v 5.1 (RHEL v.4 AS):

i386:
mod_perl-2.0.2-12.el4.i386.rpm
mod_perl-debuginfo-2.0.2-12.el4.i386.rpm

s390:
mod_perl-2.0.2-12.el4.s390.rpm
mod_perl-debuginfo-2.0.2-12.el4.s390.rpm

s390x:
mod_perl-2.0.2-12.el4.s390x.rpm
mod_perl-debuginfo-2.0.2-12.el4.s390x.rpm

x86_64:
mod_perl-2.0.2-12.el4.x86_64.rpm
mod_perl-debuginfo-2.0.2-12.el4.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1349
http://www.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is <secalert redhat com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2008 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFIouycXlSAg2UNWIIRAnuaAJ0UJcLVnB+FJj91QOFjV+TuTRWakACeNJqF
ncjn13Aq793s1j+5MdqCDCM=
=IlrE
-----END PGP SIGNATURE-----



[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]