httpd-cvs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From m..@apache.org
Subject svn commit: r366514 - in /httpd/site/trunk: docs/security/vulnerabilities_20.html xdocs/security/vulnerabilities-httpd.xml
Date Fri, 06 Jan 2006 15:16:48 GMT
Author: mjc
Date: Fri Jan  6 07:16:33 2006
New Revision: 366514

URL: http://svn.apache.org/viewcvs?rev=366514&view=rev
Log:
Some distributions have mentioned fixing CVE-2005-3357, a mod_ssl
low severity flaw, so add the details

Modified:
    httpd/site/trunk/docs/security/vulnerabilities_20.html
    httpd/site/trunk/xdocs/security/vulnerabilities-httpd.xml

Modified: httpd/site/trunk/docs/security/vulnerabilities_20.html
URL: http://svn.apache.org/viewcvs/httpd/site/trunk/docs/security/vulnerabilities_20.html?rev=366514&r1=366513&r2=366514&view=diff
==============================================================================
--- httpd/site/trunk/docs/security/vulnerabilities_20.html (original)
+++ httpd/site/trunk/docs/security/vulnerabilities_20.html Fri Jan  6 07:16:33 2006
@@ -91,6 +91,25 @@
   <blockquote>
 <dl>
 <dd>
+<b>low: </b>
+<b>
+<name name="CVE-2005-3357">mod_ssl access control DoS</name>
+</b>
+<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3357">CVE-2005-3357</a>
+<p>
+A NULL pointer dereference flaw in mod_ssl was discovered affecting server
+configurations where an SSL virtual host is configured with access control
+and a custom 400 error document. A remote attacker could send a carefully
+crafted request to trigger this issue which would lead to a crash. This
+crash would only be a denial of service if using the worker MPM.
+</p>
+</dd>
+<dd />
+<dd>
+      Affects: 
+    2.0.55, 2.0.54, 2.0.53, 2.0.52, 2.0.51, 2.0.50, 2.0.49, 2.0.48, 2.0.47, 2.0.46, 2.0.45,
2.0.44, 2.0.43, 2.0.42, 2.0.40, 2.0.39, 2.0.37, 2.0.36, 2.0.35<p />
+</dd>
+<dd>
 <b>moderate: </b>
 <b>
 <name name="CVE-2005-3352">mod_imap Referer Cross-Site Scripting</name>
@@ -146,6 +165,28 @@
 <dd>
 <b>low: </b>
 <b>
+<name name="CVE-2005-2970">Worker MPM memory leak</name>
+</b>
+<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2970">CVE-2005-2970</a>
+<p>
+A memory leak in the worker MPM would allow remote attackers to cause
+a denial of service (memory consumption) via aborted connections,
+which prevents the memory for the transaction pool from being reused
+for other connections.  This issue was downgraded in severity to low
+(from moderate) as sucessful exploitation of the race condition would
+be difficult.
+</p>
+</dd>
+<dd>
+  Update Released: 14th October 2005<br />
+</dd>
+<dd>
+      Affects: 
+    2.0.54, 2.0.53, 2.0.52, 2.0.51, 2.0.50, 2.0.49, 2.0.48, 2.0.47, 2.0.46, 2.0.45, 2.0.44,
2.0.43, 2.0.42, 2.0.40, 2.0.39, 2.0.37, 2.0.36<p />
+</dd>
+<dd>
+<b>low: </b>
+<b>
 <name name="CVE-2005-2491">PCRE overflow</name>
 </b>
 <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2491">CVE-2005-2491</a>
@@ -183,26 +224,6 @@
 <dd>
       Affects: 
     2.0.54, 2.0.53, 2.0.52, 2.0.51, 2.0.50, 2.0.49, 2.0.48, 2.0.47, 2.0.46, 2.0.45, 2.0.44,
2.0.43, 2.0.42, 2.0.40, 2.0.39, 2.0.37, 2.0.36, 2.0.35<p />
-</dd>
-<dd>
-<b>moderate: </b>
-<b>
-<name name="CVE-2005-2970">Worker MPM memory leak</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2970">CVE-2005-2970</a>
-<p>
-A memory leak in the worker MPM would allow remote attackers to cause
-a denial of service (memory consumption) via aborted connections,
-which prevents the memory for the transaction pool from being reused
-for other connections.
-</p>
-</dd>
-<dd>
-  Update Released: 14th October 2005<br />
-</dd>
-<dd>
-      Affects: 
-    2.0.54, 2.0.53, 2.0.52, 2.0.51, 2.0.50, 2.0.49, 2.0.48, 2.0.47, 2.0.46, 2.0.45, 2.0.44,
2.0.43, 2.0.42, 2.0.40, 2.0.39, 2.0.37, 2.0.36<p />
 </dd>
 <dd>
 <b>moderate: </b>

Modified: httpd/site/trunk/xdocs/security/vulnerabilities-httpd.xml
URL: http://svn.apache.org/viewcvs/httpd/site/trunk/xdocs/security/vulnerabilities-httpd.xml?rev=366514&r1=366513&r2=366514&view=diff
==============================================================================
--- httpd/site/trunk/xdocs/security/vulnerabilities-httpd.xml (original)
+++ httpd/site/trunk/xdocs/security/vulnerabilities-httpd.xml Fri Jan  6 07:16:33 2006
@@ -1,4 +1,38 @@
-<security updated="20051212">
+<security updated="20051222">
+
+<issue fixed="2.0.56-dev" public="20051212" reported="20051205">
+<cve name="CVE-2005-3357"/>
+<severity level="4">low</severity>
+<title>mod_ssl access control DoS</title>
+<description>
+<p>
+A NULL pointer dereference flaw in mod_ssl was discovered affecting server
+configurations where an SSL virtual host is configured with access control
+and a custom 400 error document. A remote attacker could send a carefully
+crafted request to trigger this issue which would lead to a crash. This
+crash would only be a denial of service if using the worker MPM.
+</p>
+</description>
+<affects prod="httpd" version="2.0.55"/>
+<affects prod="httpd" version="2.0.54"/>
+<affects prod="httpd" version="2.0.53"/>
+<affects prod="httpd" version="2.0.52"/>
+<affects prod="httpd" version="2.0.51"/>
+<affects prod="httpd" version="2.0.50"/>
+<affects prod="httpd" version="2.0.49"/>
+<affects prod="httpd" version="2.0.48"/>
+<affects prod="httpd" version="2.0.47"/>
+<affects prod="httpd" version="2.0.46"/>
+<affects prod="httpd" version="2.0.45"/>
+<affects prod="httpd" version="2.0.44"/>
+<affects prod="httpd" version="2.0.43"/>
+<affects prod="httpd" version="2.0.42"/>
+<affects prod="httpd" version="2.0.40"/>
+<affects prod="httpd" version="2.0.39"/>
+<affects prod="httpd" version="2.0.37"/>
+<affects prod="httpd" version="2.0.36"/>
+<affects prod="httpd" version="2.0.35"/>
+</issue>
 
 <issue fixed="2.2.1-dev" public="20051212" reported="20051101">
 <cve name="CVE-2005-3352"/>
@@ -87,14 +121,16 @@
 
 <issue fixed="2.0.55" released="20051014">
 <cve name="CVE-2005-2970"/>
-<severity level="3">moderate</severity>
+<severity level="4">low</severity>
 <title>Worker MPM memory leak</title>
 <description>
 <p>
 A memory leak in the worker MPM would allow remote attackers to cause
 a denial of service (memory consumption) via aborted connections,
 which prevents the memory for the transaction pool from being reused
-for other connections.
+for other connections.  This issue was downgraded in severity to low
+(from moderate) as sucessful exploitation of the race condition would
+be difficult.
 </p>
 </description>
 <affects prod="httpd" version="2.0.54"/>



Mime
View raw message