httpd-cvs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From humbed...@apache.org
Subject svn commit: r1334712 - in /httpd/site/trunk/content/security: vulnerabilities_22.mdtext vulnerabilities_22.xml
Date Sun, 06 May 2012 17:38:59 GMT
Author: humbedooh
Date: Sun May  6 17:38:59 2012
New Revision: 1334712

URL: http://svn.apache.org/viewvc?rev=1334712&view=rev
Log:
initial xforms

Added:
    httpd/site/trunk/content/security/vulnerabilities_22.mdtext
      - copied, changed from r1334665, httpd/site/trunk/content/security/vulnerabilities_22.xml
Removed:
    httpd/site/trunk/content/security/vulnerabilities_22.xml

Copied: httpd/site/trunk/content/security/vulnerabilities_22.mdtext (from r1334665, httpd/site/trunk/content/security/vulnerabilities_22.xml)
URL: http://svn.apache.org/viewvc/httpd/site/trunk/content/security/vulnerabilities_22.mdtext?p2=httpd/site/trunk/content/security/vulnerabilities_22.mdtext&p1=httpd/site/trunk/content/security/vulnerabilities_22.xml&r1=1334665&r2=1334712&rev=1334712&view=diff
==============================================================================
--- httpd/site/trunk/content/security/vulnerabilities_22.xml (original)
+++ httpd/site/trunk/content/security/vulnerabilities_22.mdtext Sun May  6 17:38:59 2012
@@ -1,1211 +1,731 @@
-<?xml version="1.0" encoding="ISO-8859-1"?>
-<document>
-<properties>
-<author email="security@httpd.apache.org">Apache HTTP Server Security Team</author>
-<title>Apache httpd 2.2 vulnerabilities</title>
-</properties>
-<body>
-<section id="top">
-<title>Apache httpd 2.2 vulnerabilities</title>
-<p>This page lists all security vulnerabilities fixed in released
-versions of Apache httpd 2.2.  Each
-vulnerability is given a security <a href="/security/impact_levels.html">impact rating</a> by the Apache
-security team - please note that this rating may well vary from
-platform to platform.  We also list the versions of Apache httpd the
-flaw is known to affect, and where a flaw has not been verified list
-the version with a question mark.  </p>
-<p> Please note that if a vulnerability is shown below as being fixed
-in a "-dev" release then this means that a fix has been applied to
-the development source tree and will be part of an upcoming full release.</p>
-<p> This page is created from a database of vulnerabilities originally
-populated by Apache Week.  Please send comments or corrections for
-these vulnerabilities to the <a href="/security_report.html">Security
-Team</a>.  </p>
-</section>
-<section id="2.2.22">
-<title>
-Fixed in Apache httpd 2.2.22</title>
-<dl>
-<dd>
-<b>low: </b>
-<b>
-<name name="CVE-2011-3607">mod_setenvif .htaccess privilege escalation</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3607">CVE-2011-3607</a>
-<p>
-An integer overflow flaw was found which, when the mod_setenvif module
-is enabled, could allow local users to gain privileges via a .htaccess
-file.
-</p>
-</dd>
-<dd>
-<p>Acknowledgements: 
-This issue was reported by halfdog
-</p>
-</dd>
-<dd>
-  Reported to security team: 4th October 2011<br/>
-  Issue public: 2nd November 2011<br/>
-  Update released: 31st January 2012<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>low: </b>
-<b>
-<name name="CVE-2012-0021">mod_log_config crash</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0021">CVE-2012-0021</a>
-<p>
-A flaw was found in mod_log_config.  If the '%{cookiename}C' log format string
-is in use, a remote attacker could send a specific cookie causing a crash.
-This crash would only be a denial of service if using a threaded MPM.
-</p>
-</dd>
-<dd>
-  Reported to security team: 30th December 2011<br/>
-  Issue public: 28th November 2011<br/>
-  Update released: 31st January 2012<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17<p/>
-</dd>
-<dd>
-<b>low: </b>
-<b>
-<name name="CVE-2012-0031">scoreboard parent DoS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0031">CVE-2012-0031</a>
-<p>
-A flaw was found in the handling of the scoreboard.  An 
-unprivileged child process could cause the parent process to crash at 
-shutdown rather than terminate cleanly. 
-</p>
-</dd>
-<dd>
-<p>Acknowledgements: 
-This issue was reported by halfdog
-</p>
-</dd>
-<dd>
-  Reported to security team: 30th December 2011<br/>
-  Issue public: 11th January 2012<br/>
-  Update released: 31st January 2012<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>moderate: </b>
-<b>
-<name name="CVE-2011-4317">mod_proxy reverse proxy exposure </name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4317">CVE-2011-4317</a>
-<p>
+Title: Apache httpd 2.2 vulnerabilities
+Notice:    Licensed to the Apache Software Foundation (ASF) under one
+           or more contributor license agreements.  See the NOTICE file
+           distributed with this work for additional information
+           regarding copyright ownership.  The ASF licenses this file
+           to you under the Apache License, Version 2.0 (the
+           "License"); you may not use this file except in compliance
+           with the License.  You may obtain a copy of the License at
+           .
+             http://www.apache.org/licenses/LICENSE-2.0
+           .
+           Unless required by applicable law or agreed to in writing,
+           software distributed under the License is distributed on an
+           "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+           KIND, either express or implied.  See the License for the
+           specific language governing permissions and limitations
+           under the License.
+
+# Apache httpd 2.2 vulnerabilities # {#top}
+
+This page lists all security vulnerabilities fixed in released versions of
+Apache httpd 2.2. Each vulnerability is given a security [impact
+rating](/security/impact_levels.html) by the Apache security team - please
+note that this rating may well vary from platform to platform. We also list
+the versions of Apache httpd the flaw is known to affect, and where a flaw
+has not been verified list the version with a question mark.
+
+Please note that if a vulnerability is shown below as being fixed in a
+"-dev" release then this means that a fix has been applied to the
+development source tree and will be part of an upcoming full release.
+
+This page is created from a database of vulnerabilities originally
+populated by Apache Week. Please send comments or corrections for these
+vulnerabilities to the [Security Team](/security_report.html).
+
+# Fixed in Apache httpd 2.2.22 # {#2.2.22}
+
+:     **low:**	**<name name="CVE-2011-3607">mod_setenvif.htaccess
+      privilege escalation</name>** 
+      [CVE-2011-3607](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3607) 
+An integer overflow flaw was found which, when the mod_setenvif module is
+enabled, could allow local users to gain privileges via a.htaccess file.
+
+Acknowledgements: This issue was reported by halfdog
+
+:    Reported to security team: 4th October 2011<br></br>Issue public:
+     2nd November 2011<br></br>Update released:
+     31st January 2012<br></br>
+:    Affected: 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15,
+     2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5,
+     2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+:     **low:**	**<name name="CVE-2012-0021">mod_log_config crash</name>** 
+      [CVE-2012-0021](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0021) 
+A flaw was found in mod_log_config. If the '%{cookiename}C' log format
+string is in use, a remote attacker could send a specific cookie causing a
+crash. This crash would only be a denial of service if using a threaded
+MPM.
+
+:    Reported to security team: 30th December 2011<br></br>Issue public:
+     28th November 2011<br></br>Update released:
+     31st January 2012<br></br>
+:    Affected: 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17
+
+:     **low:**	**<name name="CVE-2012-0031">scoreboard parent DoS</name>**
+      
+      [CVE-2012-0031](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0031) 
+A flaw was found in the handling of the scoreboard. An unprivileged child
+process could cause the parent process to crash at shutdown rather than
+terminate cleanly.
+
+Acknowledgements: This issue was reported by halfdog
+
+:    Reported to security team: 30th December 2011<br></br>Issue public:
+     11th January 2012<br></br>Update released:
+     31st January 2012<br></br>
+:    Affected: 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15,
+     2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5,
+     2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+:     **moderate:**  **<name name="CVE-2011-4317">mod_proxy reverse proxy
+      exposure</name>** 
+      [CVE-2011-4317](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4317) 
 An additional exposure was found when using mod_proxy in reverse proxy
 mode. In certain configurations using RewriteRule with proxy flag or
-ProxyPassMatch, a remote attacker could cause the reverse proxy to
-connect to an arbitrary server, possibly disclosing sensitive
-information from internal web servers not directly accessible to
-attacker.
-</p>
-</dd>
-<dd>
-<p>Acknowledgements: 
-This issue was reported by Prutha Parikh of Qualys
-</p>
-</dd>
-<dd>
-  Reported to security team: 20th October 2011<br/>
-  Issue public: 22nd January 2012<br/>
-  Update released: 31st January 2012<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>moderate: </b>
-<b>
-<name name="CVE-2012-0053">error responses can expose cookies</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053">CVE-2012-0053</a>
-<p>
-A flaw was found in the default error response for status code 400.  This flaw could
-be used by an attacker to expose "httpOnly" cookies
-when no custom ErrorDocument is specified.
-</p>
-</dd>
-<dd>
-<p>Acknowledgements: 
-This issue was reported by Norman Hippert
-</p>
-</dd>
-<dd>
-  Reported to security team: 15th January 2012<br/>
-  Issue public: 23rd January 2012<br/>
-  Update released: 31st January 2012<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>moderate: </b>
-<b>
-<name name="CVE-2011-3368">mod_proxy reverse proxy exposure</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368">CVE-2011-3368</a>
-<p>
-An exposure was found when using mod_proxy in reverse proxy mode.
-In certain configurations using RewriteRule with proxy flag or
-ProxyPassMatch, a remote attacker could cause the reverse proxy to
-connect to an arbitrary server, possibly disclosing sensitive
-information from internal web servers not directly accessible to
-attacker.</p>
-</dd>
-<dd>
-<p>Acknowledgements: 
-This issue was reported by Context Information Security Ltd
-</p>
-</dd>
-<dd>
-  Reported to security team: 16th September 2011<br/>
-  Issue public: 5th October 2011<br/>
-  Update released: 31st January 2012<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-</dl>
-</section>
-<section id="2.2.21">
-<title>
-Fixed in Apache httpd 2.2.21</title>
-<dl>
-<dd>
-<b>moderate: </b>
-<b>
-<name name="CVE-2011-3348">mod_proxy_ajp remote DoS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3348">CVE-2011-3348</a>
-<p>
+ProxyPassMatch, a remote attacker could cause the reverse proxy to connect
+to an arbitrary server, possibly disclosing sensitive information from
+internal web servers not directly accessible to attacker.
+
+Acknowledgements: This issue was reported by Prutha Parikh of Qualys
+
+:    Reported to security team: 20th October 2011<br></br>Issue public:
+     22nd January 2012<br></br>Update released:
+     31st January 2012<br></br>
+:    Affected: 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15,
+     2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5,
+     2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+:     **moderate:**  **<name name="CVE-2012-0053">error responses can
+      expose cookies</name>** 
+      [CVE-2012-0053](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053) 
+A flaw was found in the default error response for status code 400. This
+flaw could be used by an attacker to expose "httpOnly" cookies when no
+custom ErrorDocument is specified.
+
+Acknowledgements: This issue was reported by Norman Hippert
+
+:    Reported to security team: 15th January 2012<br></br>Issue public:
+     23rd January 2012<br></br>Update released:
+     31st January 2012<br></br>
+:    Affected: 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15,
+     2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5,
+     2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+:     **moderate:**  **<name name="CVE-2011-3368">mod_proxy reverse proxy
+      exposure</name>** 
+      [CVE-2011-3368](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368) 
+An exposure was found when using mod_proxy in reverse proxy mode. In
+certain configurations using RewriteRule with proxy flag or ProxyPassMatch,
+a remote attacker could cause the reverse proxy to connect to an arbitrary
+server, possibly disclosing sensitive information from internal web servers
+not directly accessible to attacker.
+
+Acknowledgements: This issue was reported by Context Information Security
+Ltd
+
+:    Reported to security team: 16th September 2011<br></br>Issue public:
+     5th October 2011<br></br>Update released:
+     31st January 2012<br></br>
+:    Affected: 2.2.21, 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15,
+     2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5,
+     2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+# Fixed in Apache httpd 2.2.21 # {#2.2.21}
+
+:     **moderate:**  **<name name="CVE-2011-3348">mod_proxy_ajp remote
+      DoS</name>** 
+      [CVE-2011-3348](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3348) 
 A flaw was found when mod_proxy_ajp is used together with
-mod_proxy_balancer.  Given a specific configuration, a remote attacker
-could send certain malformed HTTP requests, putting a backend server
-into an error state until the retry timeout expired.
-This could lead to a temporary denial of service.</p>
-</dd>
-<dd>
-  Reported to security team: 7th September 2011<br/>
-  Issue public: 14th September 2011<br/>
-  Update released: 14th September 2011<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12<p/>
-</dd>
-</dl>
-</section>
-<section id="2.2.20">
-<title>
-Fixed in Apache httpd 2.2.20</title>
-<dl>
-<dd>
-<b>important: </b>
-<b>
-<name name="CVE-2011-3192">Range header remote DoS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192">CVE-2011-3192</a>
-<p>
+mod_proxy_balancer. Given a specific configuration, a remote attacker could
+send certain malformed HTTP requests, putting a backend server into an
+error state until the retry timeout expired. This could lead to a temporary
+denial of service.
+
+:    Reported to security team: 7th September 2011<br></br>Issue public:
+     14th September 2011<br></br>Update released:
+     14th September 2011<br></br>
+:    Affected: 2.2.20, 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14,
+     2.2.13, 2.2.12
+
+# Fixed in Apache httpd 2.2.20 # {#2.2.20}
+
+:     **important:**  **<name name="CVE-2011-3192">Range header remote
+      DoS</name>** 
+      [CVE-2011-3192](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192) 
 A flaw was found in the way the Apache HTTP Server handled Range HTTP
-headers. A remote attacker could use this flaw to cause httpd to use
-an excessive amount of memory and CPU time via HTTP requests with a
-specially-crafted Range header.  This could be used in a denial of
-service attack.  </p>
-<p>
-Advisory: <a href="CVE-2011-3192.txt">CVE-2011-3192.txt</a>
-</p>
-</dd>
-<dd>
-  Issue public: 20th August 2011<br/>
-  Update released: 30th August 2011<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-</dl>
-</section>
-<section id="2.2.19">
-<title>
-Fixed in Apache httpd 2.2.19</title>
-<dl>
-<dd>
-<b>moderate: </b>
-<b>
-<name name="CVE-2011-0419">apr_fnmatch flaw leads to mod_autoindex remote DoS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0419">CVE-2011-0419</a>
-<p>
-A flaw was found in the apr_fnmatch() function of the bundled APR
-library.  Where mod_autoindex is enabled, and a directory indexed by
-mod_autoindex contained files with sufficiently long names, a
-remote attacker could send a carefully crafted request which would
-cause excessive CPU usage.  This could be used in a denial of service
+headers. A remote attacker could use this flaw to cause httpd to use an
+excessive amount of memory and CPU time via HTTP requests with a
+specially-crafted Range header. This could be used in a denial of service
 attack.
-</p>
-<p>
+
+Advisory: [CVE-2011-3192.txt](CVE-2011-3192.txt) 
+
+:    Issue public: 20th August 2011<br></br>Update released:
+     30th August 2011<br></br>
+:    Affected: 2.2.19, 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13,
+     2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3,
+     2.2.2, 2.2.0
+
+# Fixed in Apache httpd 2.2.19 # {#2.2.19}
+
+:     **moderate:**  **<name name="CVE-2011-0419">apr_fnmatch flaw leads to
+      mod_autoindex remote DoS</name>** 
+      [CVE-2011-0419](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0419) 
+A flaw was found in the apr_fnmatch() function of the bundled APR library.
+Where mod_autoindex is enabled, and a directory indexed by mod_autoindex
+contained files with sufficiently long names, a remote attacker could send
+a carefully crafted request which would cause excessive CPU usage. This
+could be used in a denial of service attack.
+
 Workaround: Setting the 'IgnoreClient' option to the 'IndexOptions'
 directive disables processing of the client-supplied request query
 arguments, preventing this attack.
-</p>
-<p>
+
 Resolution: Update APR to release 1.4.5 (bundled with httpd 2.2.19)
-</p>
-</dd>
-<dd>
-<p>Acknowledgements: 
-This issue was reported by Maksymilian Arciemowicz
-</p>
-</dd>
-<dd>
-  Reported to security team: 2nd March 2011<br/>
-  Issue public: 10th May 2011<br/>
-  Update released: 21st May 2011<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-</dl>
-</section>
-<section id="2.2.17">
-<title>
-Fixed in Apache httpd 2.2.17</title>
-<dl>
-<dd>
-<b>low: </b>
-<b>
-<name name="CVE-2009-3720">expat DoS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720">CVE-2009-3720</a>
-<p>
-A buffer over-read flaw was found in the bundled expat
-library.  An attacker who is able to get Apache to parse
-an untrused XML document (for example through mod_dav) may
-be able to cause a crash.  This crash would only
-be a denial of service if using the worker MPM.
-</p>
-</dd>
-<dd>
-  Reported to security team: 21st August 2009<br/>
-  Issue public: 17th January 2009<br/>
-  Update released: 19th October 2010<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>low: </b>
-<b>
-<name name="CVE-2009-3560">expat DoS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560">CVE-2009-3560</a>
-<p>
-A buffer over-read flaw was found in the bundled expat
-library.  An attacker who is able to get Apache to parse
-an untrused XML document (for example through mod_dav) may
-be able to cause a crash.  This crash would only                                                                                                                  
-be a denial of service if using the worker MPM.
-</p>
-</dd>
-<dd>
-  Issue public: 2nd December 2009<br/>
-  Update released: 19th October 2010<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>low: </b>
-<b>
-<name name="CVE-2010-1623">apr_bridage_split_line DoS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1623">CVE-2010-1623</a>
-<p>
+
+Acknowledgements: This issue was reported by Maksymilian Arciemowicz
+
+:    Reported to security team: 2nd March 2011<br></br>Issue public:
+     10th May 2011<br></br>Update released: 21st May 2011<br></br>
+:    Affected: 2.2.18, 2.2.17, 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12,
+     2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+# Fixed in Apache httpd 2.2.17 # {#2.2.17}
+
+:     **low:**	**<name name="CVE-2009-3720">expat DoS</name>** 
+      [CVE-2009-3720](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720) 
+A buffer over-read flaw was found in the bundled expat library. An attacker
+who is able to get Apache to parse an untrused XML document (for example
+through mod_dav) may be able to cause a crash. This crash would only be a
+denial of service if using the worker MPM.
+
+:    Reported to security team: 21st August 2009<br></br>Issue public:
+     17th January 2009<br></br>Update released:
+     19th October 2010<br></br>
+:    Affected: 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10,
+     2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+:     **low:**	**<name name="CVE-2009-3560">expat DoS</name>** 
+      [CVE-2009-3560](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560) 
+A buffer over-read flaw was found in the bundled expat library. An attacker
+who is able to get Apache to parse an untrused XML document (for example
+through mod_dav) may be able to cause a crash. This crash would only be a
+denial of service if using the worker MPM.
+
+:    Issue public: 2nd December 2009<br></br>Update released:
+     19th October 2010<br></br>
+:    Affected: 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10,
+     2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+:     **low:**	**<name name="CVE-2010-1623">apr_bridage_split_line
+      DoS</name>** 
+      [CVE-2010-1623](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1623) 
 A flaw was found in the apr_brigade_split_line() function of the bundled
-APR-util library, used to process non-SSL requests.  A remote attacker
-could send requests, carefully crafting the timing of individual bytes,
-which would slowly consume memory, potentially leading to a denial of
-service.
-</p>
-</dd>
-<dd>
-  Reported to security team: 3rd March 2010<br/>
-  Issue public: 1st October 2010<br/>
-  Update released: 19th October 2010<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-</dl>
-</section>
-<section id="2.2.16">
-<title>
-Fixed in Apache httpd 2.2.16</title>
-<dl>
-<dd>
-<b>important: </b>
-<b>
-<name name="CVE-2010-2068">Timeout detection flaw (mod_proxy_http)</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2068">CVE-2010-2068</a>
-<p>
+APR-util library, used to process non-SSL requests. A remote attacker could
+send requests, carefully crafting the timing of individual bytes, which
+would slowly consume memory, potentially leading to a denial of service.
+
+:    Reported to security team: 3rd March 2010<br></br>Issue public:
+     1st October 2010<br></br>Update released:
+     19th October 2010<br></br>
+:    Affected: 2.2.16, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10,
+     2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+# Fixed in Apache httpd 2.2.16 # {#2.2.16}
+
+:     **important:**  **<name name="CVE-2010-2068">Timeout detection flaw
+      (mod_proxy_http)</name>** 
+      [CVE-2010-2068](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2068) 
 An information disclosure flaw was found in mod_proxy_http in versions
-2.2.9 through 2.2.15, 2.3.4-alpha and 2.3.5-alpha.  Under certain timeout 
+2.2.9 through 2.2.15, 2.3.4-alpha and 2.3.5-alpha. Under certain timeout
 conditions, the server could return a response intended for another user.
-Only Windows, Netware and OS2 operating systems are affected.  Only those
+Only Windows, Netware and OS2 operating systems are affected. Only those
 configurations which trigger the use of proxy worker pools are affected.
-There was no vulnerability on earlier versions, as proxy pools were not 
-yet introduced.  The simplest workaround is to globally configure;</p>
-<p>SetEnv proxy-nokeepalive 1</p>
-<p>Source code patches are at;</p>
-<ul>
-<li>
-<a href="http://www.apache.org/dist/httpd/patches/apply_to_2.2.15/CVE-2010-2068-r953616.patch">http://www.apache.org/dist/httpd/patches/apply_to_2.2.15/CVE-2010-2068-r953616.patch</a>
-</li>
-<li>
-<a href="http://www.apache.org/dist/httpd/patches/apply_to_2.3.5/CVE-2010-2068-r953418.patch">http://www.apache.org/dist/httpd/patches/apply_to_2.3.5/CVE-2010-2068-r953418.patch</a>
-</li>
-</ul>
-<p>Binary replacement modules are at</p>
-<ul>
-<li>
-<a href="http://www.apache.org/dist/httpd/binaries/win32/mod_proxy_http-CVE-2010-2068.zip">http://www.apache.org/dist/httpd/binaries/win32/mod_proxy_http-CVE-2010-2068.zip</a>
-</li>
-</ul>
-</dd>
-<dd>
-<p>Acknowledgements: 
-We would like to thank Loren Anderson for the detailed analysis and 
-reporting of this issue.
-</p>
-</dd>
-<dd>
-  Issue public: 9th June 2010<br/>
-  Update released: 25th July 2010<br/>
-</dd>
-<dd>
-      Affected: 
-    2.3.5-alpha, 2.3.4-alpha, 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9<p/>
-</dd>
-<dd>
-<b>low: </b>
-<b>
-<name name="CVE-2010-1452">mod_cache and mod_dav DoS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1452">CVE-2010-1452</a>
-<p>
-A flaw was found in the handling of requests by mod_cache and mod_dav.
-A malicious remote attacker could send a carefully crafted request and
-cause a httpd child process to crash.  This crash would only
-be a denial of service if using the worker MPM.  This issue is further
-mitigated as mod_dav is only affected by requests that are most likely
-to be authenticated, and mod_cache is only affected if the uncommon
-"CacheIgnoreURLSessionIdentifiers" directive, introduced in 
-version 2.2.14, is used.
-</p>
-</dd>
-<dd>
-<p>Acknowledgements: 
-This issue was reported by Mark Drayton.
-</p>
-</dd>
-<dd>
-  Reported to security team: 4th May 2010<br/>
-  Issue public: 25th July 2010<br/>
-  Update released: 25th July 2010<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-</dl>
-</section>
-<section id="2.2.15">
-<title>
-Fixed in Apache httpd 2.2.15</title>
-<dl>
-<dd>
-<b>important: </b>
-<b>
-<name name="CVE-2010-0425">mod_isapi module unload flaw</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0425">CVE-2010-0425</a>
-<p>
-A flaw was found with within mod_isapi which would attempt to unload the ISAPI dll when it
-encountered various error states.  This could leave the callbacks in an
-undefined state and result in a segfault.  On Windows platforms using mod_isapi, a 
-remote attacker could send a malicious request to trigger this issue, and as win32 MPM runs only one
-process, this would result in a denial of service, and potentially allow
-arbitrary code execution.
-</p>
-</dd>
-<dd>
-<p>Acknowledgements: 
-We would like to thank Brett Gervasoni of Sense of Security for reporting and
-proposing a patch fix for this issue.
-</p>
-</dd>
-<dd>
-  Reported to security team: 9th February 2010<br/>
-  Issue public: 2nd March 2010<br/>
-  Update released: 5th March 2010<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>low: </b>
-<b>
-<name name="CVE-2010-0434">Subrequest handling of request headers (mod_headers)</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434">CVE-2010-0434</a>
-<p>
-A flaw in the core subrequest process code was fixed, to always provide a shallow copy of the headers_in
-array to the subrequest, instead of a pointer to the parent request's array
-as it had for requests without request bodies.  This meant all modules such
-as mod_headers which may manipulate the input headers for a subrequest would
-poison the parent request in two ways, one by modifying the parent request,
-which might not be intended, and second by leaving pointers to modified header
-fields in memory allocated to the subrequest scope, which could be freed
-before the main request processing was finished, resulting in a segfault or
-in revealing data from another request on threaded servers, such as the worker
+There was no vulnerability on earlier versions, as proxy pools were not yet
+introduced. The simplest workaround is to globally configure;
+
+SetEnv proxy-nokeepalive 1
+
+Source code patches are at;
+
+- 
+[http://www.apache.org/dist/httpd/patches/apply_to_2.2.15/CVE-2010-2068-r953616.patch](http://www.apache.org/dist/httpd/patches/apply_to_2.2.15/CVE-2010-2068-r953616.patch) 
+
+- 
+[http://www.apache.org/dist/httpd/patches/apply_to_2.3.5/CVE-2010-2068-r953418.patch](http://www.apache.org/dist/httpd/patches/apply_to_2.3.5/CVE-2010-2068-r953418.patch) 
+
+Binary replacement modules are at
+
+- 
+[http://www.apache.org/dist/httpd/binaries/win32/mod_proxy_http-CVE-2010-2068.zip](http://www.apache.org/dist/httpd/binaries/win32/mod_proxy_http-CVE-2010-2068.zip) 
+
+Acknowledgements: We would like to thank Loren Anderson for the detailed
+analysis and reporting of this issue.
+
+:    Issue public: 9th June 2010<br></br>Update released:
+     25th July 2010<br></br>
+:    Affected: 2.3.5-alpha, 2.3.4-alpha, 2.2.15, 2.2.14, 2.2.13, 2.2.12,
+     2.2.11, 2.2.10, 2.2.9
+
+:     **low:**	**<name name="CVE-2010-1452">mod_cache and mod_dav
+      DoS</name>** 
+      [CVE-2010-1452](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1452) 
+A flaw was found in the handling of requests by mod_cache and mod_dav. A
+malicious remote attacker could send a carefully crafted request and cause
+a httpd child process to crash. This crash would only be a denial of
+service if using the worker MPM. This issue is further mitigated as mod_dav
+is only affected by requests that are most likely to be authenticated, and
+mod_cache is only affected if the uncommon
+"CacheIgnoreURLSessionIdentifiers" directive, introduced in version 2.2.14,
+is used.
+
+Acknowledgements: This issue was reported by Mark Drayton.
+
+:    Reported to security team: 4th May 2010<br></br>Issue public:
+     25th July 2010<br></br>Update released: 25th July 2010<br></br>
+:    Affected: 2.2.15, 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9,
+     2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+# Fixed in Apache httpd 2.2.15 # {#2.2.15}
+
+:     **important:**  **<name name="CVE-2010-0425">mod_isapi module unload
+      flaw</name>** 
+      [CVE-2010-0425](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0425) 
+A flaw was found with within mod_isapi which would attempt to unload the
+ISAPI dll when it encountered various error states. This could leave the
+callbacks in an undefined state and result in a segfault. On Windows
+platforms using mod_isapi, a remote attacker could send a malicious request
+to trigger this issue, and as win32 MPM runs only one process, this would
+result in a denial of service, and potentially allow arbitrary code
+execution.
+
+Acknowledgements: We would like to thank Brett Gervasoni of Sense of
+Security for reporting and proposing a patch fix for this issue.
+
+:    Reported to security team: 9th February 2010<br></br>Issue public:
+     2nd March 2010<br></br>Update released: 5th March 2010<br></br>
+:    Affected: 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6,
+     2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+:     **low:**	**<name name="CVE-2010-0434">Subrequest handling of request
+      headers (mod_headers)</name>** 
+      [CVE-2010-0434](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434) 
+A flaw in the core subrequest process code was fixed, to always provide a
+shallow copy of the headers_in array to the subrequest, instead of a
+pointer to the parent request's array as it had for requests without
+request bodies. This meant all modules such as mod_headers which may
+manipulate the input headers for a subrequest would poison the parent
+request in two ways, one by modifying the parent request, which might not
+be intended, and second by leaving pointers to modified header fields in
+memory allocated to the subrequest scope, which could be freed before the
+main request processing was finished, resulting in a segfault or in
+revealing data from another request on threaded servers, such as the worker
 or winnt MPMs.
-</p>
-</dd>
-<dd>
-<p>Acknowledgements: 
-We would like to thank Philip Pickett of VMware for reporting and proposing a 
-fix for this issue.
-</p>
-</dd>
-<dd>
-  Issue public: 9th December 2009<br/>
-  Update released: 5th March 2010<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>moderate: </b>
-<b>
-<name name="CVE-2010-0408">mod_proxy_ajp DoS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0408">CVE-2010-0408</a>
-<p>
-mod_proxy_ajp would return the wrong status code if it encountered
-an error, causing a backend server to be put into an error state until
-the retry timeout expired.  A remote attacker could send malicious requests
-to trigger this issue, resulting in denial of service.
-</p>
-</dd>
-<dd>
-<p>Acknowledgements: 
-We would like to thank Niku Toivola of Sulake Corporation for reporting and
-proposing a patch fix for this issue.
-</p>
-</dd>
-<dd>
-  Reported to security team: 2nd February 2010<br/>
-  Issue public: 2nd March 2010<br/>
-  Update released: 5th March 2010<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-</dl>
-</section>
-<section id="2.2.14">
-<title>
-Fixed in Apache httpd 2.2.14</title>
-<dl>
-<dd>
-<b>low: </b>
-<b>
-<name name="CVE-2009-3094">mod_proxy_ftp DoS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094">CVE-2009-3094</a>
-<p>
-A NULL pointer dereference flaw was found in the mod_proxy_ftp
-module. A malicious FTP server to which requests are being proxied
-could use this flaw to crash an httpd child process via a malformed
-reply to the EPSV or PASV commands, resulting in a limited denial of
-service.
-</p>
-</dd>
-<dd>
-  Reported to security team: 4th September 2009<br/>
-  Issue public: 2nd August 2009<br/>
-  Update released: 5th October 2009<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>low: </b>
-<b>
-<name name="CVE-2009-3095">mod_proxy_ftp FTP command injection</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095">CVE-2009-3095</a>
-<p>
+
+Acknowledgements: We would like to thank Philip Pickett of VMware for
+reporting and proposing a fix for this issue.
+
+:    Issue public: 9th December 2009<br></br>Update released:
+     5th March 2010<br></br>
+:    Affected: 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6,
+     2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+:     **moderate:**  **<name name="CVE-2010-0408">mod_proxy_ajp
+      DoS</name>** 
+      [CVE-2010-0408](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0408) 
+mod_proxy_ajp would return the wrong status code if it encountered an
+error, causing a backend server to be put into an error state until the
+retry timeout expired. A remote attacker could send malicious requests to
+trigger this issue, resulting in denial of service.
+
+Acknowledgements: We would like to thank Niku Toivola of Sulake Corporation
+for reporting and proposing a patch fix for this issue.
+
+:    Reported to security team: 2nd February 2010<br></br>Issue public:
+     2nd March 2010<br></br>Update released: 5th March 2010<br></br>
+:    Affected: 2.2.14, 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6,
+     2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+# Fixed in Apache httpd 2.2.14 # {#2.2.14}
+
+:     **low:**	**<name name="CVE-2009-3094">mod_proxy_ftp DoS</name>** 
+      [CVE-2009-3094](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094) 
+A NULL pointer dereference flaw was found in the mod_proxy_ftp module. A
+malicious FTP server to which requests are being proxied could use this
+flaw to crash an httpd child process via a malformed reply to the EPSV or
+PASV commands, resulting in a limited denial of service.
+
+:    Reported to security team: 4th September 2009<br></br>Issue public:
+     2nd August 2009<br></br>Update released: 5th October 2009<br></br>
+:    Affected: 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5,
+     2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+:     **low:**	**<name name="CVE-2009-3095">mod_proxy_ftp FTP command
+      injection</name>** 
+      [CVE-2009-3095](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095) 
 A flaw was found in the mod_proxy_ftp module. In a reverse proxy
-configuration, a remote attacker could use this flaw to bypass
-intended access restrictions by creating a carefully-crafted HTTP
-Authorization header, allowing the attacker to send arbitrary commands
-to the FTP server.
-</p>
-</dd>
-<dd>
-  Reported to security team: 3rd September 2009<br/>
-  Issue public: 3rd August 2009<br/>
-  Update released: 5th October 2009<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>moderate: </b>
-<b>
-<name name="CVE-2009-2699">Solaris pollset DoS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2699">CVE-2009-2699</a>
-<p>Faulty error handling was found affecting Solaris pollset support
-(Event Port backend) caused by a bug in APR.  A remote attacker
-could trigger this issue on Solaris servers which used prefork or
-event MPMs, resulting in a denial of service.
-</p>
-</dd>
-<dd>
-  Reported to security team: 5th August 2009<br/>
-  Issue public: 23rd September 2009<br/>
-  Update released: 5th October 2009<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-</dl>
-</section>
-<section id="2.2.13">
-<title>
-Fixed in Apache httpd 2.2.13</title>
-<dl>
-<dd>
-<b>low: </b>
-<b>
-<name name="CVE-2009-2412">APR apr_palloc heap overflow</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412">CVE-2009-2412</a>
-<p>
-A flaw in apr_palloc() in the bundled copy of APR could
-cause heap overflows in programs that try to apr_palloc() a user
-controlled size.  The Apache HTTP Server itself does not pass 
-unsanitized user-provided sizes to this function, so it could only
-be triggered through some other application which uses apr_palloc()
-in a vulnerable way.
-</p>
-</dd>
-<dd>
-  Reported to security team: 27th July 2009<br/>
-  Issue public: 4th August 2009<br/>
-  Update released: 9th August 2009<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-</dl>
-</section>
-<section id="2.2.12">
-<title>
-Fixed in Apache httpd 2.2.12</title>
-<dl>
-<dd>
-<b>important: </b>
-<b>
-<name name="CVE-2009-1890">mod_proxy reverse proxy DoS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890">CVE-2009-1890</a>
-<p>
-A denial of service flaw was found in the mod_proxy module when it was
-used as a reverse proxy. A remote attacker could use this flaw to
-force a proxy process to consume large amounts of CPU time.
-</p>
-</dd>
-<dd>
-  Reported to security team: 30th June 2009<br/>
-  Issue public: 2nd July 2009<br/>
-  Update released: 27th July 2009<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>important: </b>
-<b>
-<name name="CVE-2009-1191">mod_proxy_ajp information disclosure</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1191">CVE-2009-1191</a>
-<p>
-An information disclosure flaw was found in mod_proxy_ajp in version
-2.2.11 only. In certain
-situations, if a user sent a carefully crafted HTTP request, the server
-could return a response intended for another user.
-</p>
-</dd>
-<dd>
-  Reported to security team: 5th March 2009<br/>
-  Issue public: 21st April 2009<br/>
-  Update released: 27th July 2009<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.11<p/>
-</dd>
-<dd>
-<b>low: </b>
-<b>
-<name name="CVE-2009-1891">mod_deflate DoS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891">CVE-2009-1891</a>
-<p>
-A denial of service flaw was found in the mod_deflate module. This
-module continued to compress large files until compression was
-complete, even if the network connection that requested the content
-was closed before compression completed. This would cause mod_deflate
-to consume large amounts of CPU if mod_deflate was enabled for a large
-file.</p>
-</dd>
-<dd>
-  Issue public: 26th June 2009<br/>
-  Update released: 27th July 2009<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>low: </b>
-<b>
-<name name="CVE-2009-1195">AllowOverride Options handling bypass</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195">CVE-2009-1195</a>
-<p>
+configuration, a remote attacker could use this flaw to bypass intended
+access restrictions by creating a carefully-crafted HTTP Authorization
+header, allowing the attacker to send arbitrary commands to the FTP server.
+
+:    Reported to security team: 3rd September 2009<br></br>Issue public:
+     3rd August 2009<br></br>Update released: 5th October 2009<br></br>
+:    Affected: 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5,
+     2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+:     **moderate:**  **<name name="CVE-2009-2699">Solaris pollset
+      DoS</name>** 
+      [CVE-2009-2699](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2699) 
+Faulty error handling was found affecting Solaris pollset support (Event
+Port backend) caused by a bug in APR. A remote attacker could trigger this
+issue on Solaris servers which used prefork or event MPMs, resulting in a
+denial of service.
+
+:    Reported to security team: 5th August 2009<br></br>Issue public:
+     23rd September 2009<br></br>Update released:
+     5th October 2009<br></br>
+:    Affected: 2.2.13, 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5,
+     2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+# Fixed in Apache httpd 2.2.13 # {#2.2.13}
+
+:     **low:**	**<name name="CVE-2009-2412">APR apr_palloc heap
+      overflow</name>** 
+      [CVE-2009-2412](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412) 
+A flaw in apr_palloc() in the bundled copy of APR could cause heap
+overflows in programs that try to apr_palloc() a user controlled size. The
+Apache HTTP Server itself does not pass unsanitized user-provided sizes to
+this function, so it could only be triggered through some other application
+which uses apr_palloc() in a vulnerable way.
+
+:    Reported to security team: 27th July 2009<br></br>Issue public:
+     4th August 2009<br></br>Update released: 9th August 2009<br></br>
+:    Affected: 2.2.12, 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4,
+     2.2.3, 2.2.2, 2.2.0
+
+# Fixed in Apache httpd 2.2.12 # {#2.2.12}
+
+:     **important:**  **<name name="CVE-2009-1890">mod_proxy reverse proxy
+      DoS</name>** 
+      [CVE-2009-1890](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890) 
+A denial of service flaw was found in the mod_proxy module when it was used
+as a reverse proxy. A remote attacker could use this flaw to force a proxy
+process to consume large amounts of CPU time.
+
+:    Reported to security team: 30th June 2009<br></br>Issue public:
+     2nd July 2009<br></br>Update released: 27th July 2009<br></br>
+:    Affected: 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3,
+     2.2.2, 2.2.0
+
+:     **important:**  **<name name="CVE-2009-1191">mod_proxy_ajp
+      information disclosure</name>** 
+      [CVE-2009-1191](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1191) 
+An information disclosure flaw was found in mod_proxy_ajp in version 2.2.11
+only. In certain situations, if a user sent a carefully crafted HTTP
+request, the server could return a response intended for another user.
+
+:    Reported to security team: 5th March 2009<br></br>Issue public:
+     21st April 2009<br></br>Update released: 27th July 2009<br></br>
+:    Affected: 2.2.11
+
+:     **low:**	**<name name="CVE-2009-1891">mod_deflate DoS</name>** 
+      [CVE-2009-1891](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891) 
+A denial of service flaw was found in the mod_deflate module. This module
+continued to compress large files until compression was complete, even if
+the network connection that requested the content was closed before
+compression completed. This would cause mod_deflate to consume large
+amounts of CPU if mod_deflate was enabled for a large file.
+
+:    Issue public: 26th June 2009<br></br>Update released:
+     27th July 2009<br></br>
+:    Affected: 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3,
+     2.2.2, 2.2.0
+
+:     **low:**	**<name name="CVE-2009-1195">AllowOverride Options handling
+      bypass</name>** 
+      [CVE-2009-1195](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195) 
 A flaw was found in the handling of the "Options" and "AllowOverride"
-directives.  In configurations using the "AllowOverride" directive
-with certain "Options=" arguments, local users were not restricted
-from executing commands from a Server-Side-Include script as intended.
-</p>
-</dd>
-<dd>
-  Reported to security team: 9th March 2009<br/>
-  Issue public: 22nd April 2009<br/>
-  Update released: 27th July 2009<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>moderate: </b>
-<b>
-<name name="CVE-2009-1956">APR-util off-by-one overflow</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956">CVE-2009-1956</a>
-<p>
-An off-by-one overflow flaw was found in the way the bundled copy of
-the APR-util library processed a variable list of arguments. An
-attacker could provide a specially-crafted string as input for the
-formatted output conversion routine, which could, on big-endian
-platforms, potentially lead to the disclosure of sensitive information
-or a denial of service.
-</p>
-</dd>
-<dd>
-  Issue public: 24th April 2009<br/>
-  Update released: 72th  2009<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>moderate: </b>
-<b>
-<name name="CVE-2009-1955">APR-util XML DoS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955">CVE-2009-1955</a>
-<p>
+directives. In configurations using the "AllowOverride" directive with
+certain "Options=" arguments, local users were not restricted from
+executing commands from a Server-Side-Include script as intended.
+
+:    Reported to security team: 9th March 2009<br></br>Issue public:
+     22nd April 2009<br></br>Update released: 27th July 2009<br></br>
+:    Affected: 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3,
+     2.2.2, 2.2.0
+
+:     **moderate:**  **<name name="CVE-2009-1956">APR-util off-by-one
+      overflow</name>** 
+      [CVE-2009-1956](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956) 
+An off-by-one overflow flaw was found in the way the bundled copy of the
+APR-util library processed a variable list of arguments. An attacker could
+provide a specially-crafted string as input for the formatted output
+conversion routine, which could, on big-endian platforms, potentially lead
+to the disclosure of sensitive information or a denial of service.
+
+:    Issue public: 24th April 2009<br></br>Update released:
+     72th  2009<br></br>
+:    Affected: 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3,
+     2.2.2, 2.2.0
+
+:     **moderate:**  **<name name="CVE-2009-1955">APR-util XML DoS</name>**
+      
+      [CVE-2009-1955](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955) 
 A denial of service flaw was found in the bundled copy of the APR-util
-library Extensible Markup Language (XML) parser. A remote attacker
-could create a specially-crafted XML document that would cause
-excessive memory consumption when processed by the XML decoding
-engine.
-</p>
-</dd>
-<dd>
-  Issue public: 1st June 2009<br/>
-  Update released: 27th July 2009<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>moderate: </b>
-<b>
-<name name="CVE-2009-0023">APR-util heap underwrite</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023">CVE-2009-0023</a>
-<p>
-A heap-based underwrite flaw was found in the way the bundled copy of
-the APR-util library created compiled forms of particular search
-patterns. An attacker could formulate a specially-crafted search
-keyword, that would overwrite arbitrary heap memory locations when
-processed by the pattern preparation engine.
-</p>
-</dd>
-<dd>
-  Issue public: 1st June 2009<br/>
-  Update released: 27th July 2009<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-</dl>
-</section>
-<section id="2.2.10">
-<title>
-Fixed in Apache httpd 2.2.10</title>
-<dl>
-<dd>
-<b>important: </b>
-<b>
-<name name="CVE-2010-2791">Timeout detection flaw (mod_proxy_http)</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2791">CVE-2010-2791</a>
-<p>
-An information disclosure flaw was found in mod_proxy_http in version
-2.2.9 only, on Unix platforms.  Under certain timeout 
-conditions, the server could return a response intended for another user.
-Only those configurations which trigger the use of proxy worker pools
-are affected.  There was no vulnerability on earlier versions, as
-proxy pools were not yet introduced.  The simplest workaround is to
-globally configure:</p>
-<p>SetEnv proxy-nokeepalive 1</p>
-</dd>
-<dd>
-  Issue public: 23rd July 2010<br/>
-  Update released: 31st October 2008<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.9<p/>
-</dd>
-<dd>
-<b>low: </b>
-<b>
-<name name="CVE-2008-2939">mod_proxy_ftp globbing XSS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939">CVE-2008-2939</a>
-<p>
-A flaw was found in the handling of wildcards in the path of a FTP
-URL with mod_proxy_ftp.  If mod_proxy_ftp is enabled to support
-FTP-over-HTTP, requests containing globbing characters could lead
-to cross-site scripting (XSS) attacks.</p>
-</dd>
-<dd>
-  Reported to security team: 28th July 2008<br/>
-  Issue public: 5th August 2008<br/>
-  Update released: 31st October 2008<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-</dl>
-</section>
-<section id="2.2.9">
-<title>
-Fixed in Apache httpd 2.2.9</title>
-<dl>
-<dd>
-<b>low: </b>
-<b>
-<name name="CVE-2007-6420">mod_proxy_balancer CSRF</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6420">CVE-2007-6420</a>
-<p>
+library Extensible Markup Language (XML) parser. A remote attacker could
+create a specially-crafted XML document that would cause excessive memory
+consumption when processed by the XML decoding engine.
+
+:    Issue public: 1st June 2009<br></br>Update released:
+     27th July 2009<br></br>
+:    Affected: 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3,
+     2.2.2, 2.2.0
+
+:     **moderate:**  **<name name="CVE-2009-0023">APR-util heap
+      underwrite</name>** 
+      [CVE-2009-0023](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023) 
+A heap-based underwrite flaw was found in the way the bundled copy of the
+APR-util library created compiled forms of particular search patterns. An
+attacker could formulate a specially-crafted search keyword, that would
+overwrite arbitrary heap memory locations when processed by the pattern
+preparation engine.
+
+:    Issue public: 1st June 2009<br></br>Update released:
+     27th July 2009<br></br>
+:    Affected: 2.2.11, 2.2.10, 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3,
+     2.2.2, 2.2.0
+
+# Fixed in Apache httpd 2.2.10 # {#2.2.10}
+
+:     **important:**  **<name name="CVE-2010-2791">Timeout detection flaw
+      (mod_proxy_http)</name>** 
+      [CVE-2010-2791](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2791) 
+An information disclosure flaw was found in mod_proxy_http in version 2.2.9
+only, on Unix platforms. Under certain timeout conditions, the server could
+return a response intended for another user. Only those configurations
+which trigger the use of proxy worker pools are affected. There was no
+vulnerability on earlier versions, as proxy pools were not yet introduced.
+The simplest workaround is to globally configure:
+
+SetEnv proxy-nokeepalive 1
+
+:    Issue public: 23rd July 2010<br></br>Update released:
+     31st October 2008<br></br>
+:    Affected: 2.2.9
+
+:     **low:**	**<name name="CVE-2008-2939">mod_proxy_ftp globbing
+      XSS</name>** 
+      [CVE-2008-2939](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939) 
+A flaw was found in the handling of wildcards in the path of a FTP URL with
+mod_proxy_ftp. If mod_proxy_ftp is enabled to support FTP-over-HTTP,
+requests containing globbing characters could lead to cross-site scripting
+(XSS) attacks.
+
+:    Reported to security team: 28th July 2008<br></br>Issue public:
+     5th August 2008<br></br>Update released:
+     31st October 2008<br></br>
+:    Affected: 2.2.9, 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+# Fixed in Apache httpd 2.2.9 # {#2.2.9}
+
+:     **low:**	**<name name="CVE-2007-6420">mod_proxy_balancer
+      CSRF</name>** 
+      [CVE-2007-6420](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6420) 
 The mod_proxy_balancer provided an administrative interface that could be
 vulnerable to cross-site request forgery (CSRF) attacks.
-</p>
-</dd>
-<dd>
-  Reported to security team: 12th October 2007<br/>
-  Issue public: 9th January 2008<br/>
-  Update released: 14th June 2008<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>moderate: </b>
-<b>
-<name name="CVE-2008-2364">mod_proxy_http DoS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364">CVE-2008-2364</a>
-<p>
-A flaw was found in the handling of excessive interim responses
-from an origin server when using mod_proxy_http.  A remote attacker
-could cause a denial of service or high memory usage.</p>
-</dd>
-<dd>
-  Reported to security team: 29th May 2008<br/>
-  Issue public: 10th June 2008<br/>
-  Update released: 14th June 2008<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-</dl>
-</section>
-<section id="2.2.8">
-<title>
-Fixed in Apache httpd 2.2.8</title>
-<dl>
-<dd>
-<b>low: </b>
-<b>
-<name name="CVE-2008-0005">mod_proxy_ftp UTF-7 XSS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0005">CVE-2008-0005</a>
-<p>
+
+:    Reported to security team: 12th October 2007<br></br>Issue public:
+     9th January 2008<br></br>Update released: 14th June 2008<br></br>
+:    Affected: 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+:     **moderate:**  **<name name="CVE-2008-2364">mod_proxy_http
+      DoS</name>** 
+      [CVE-2008-2364](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364) 
+A flaw was found in the handling of excessive interim responses from an
+origin server when using mod_proxy_http. A remote attacker could cause a
+denial of service or high memory usage.
+
+:    Reported to security team: 29th May 2008<br></br>Issue public:
+     10th June 2008<br></br>Update released: 14th June 2008<br></br>
+:    Affected: 2.2.8, 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+# Fixed in Apache httpd 2.2.8 # {#2.2.8}
+
+:     **low:**	**<name name="CVE-2008-0005">mod_proxy_ftp UTF-7
+      XSS</name>** 
+      [CVE-2008-0005](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0005) 
 A workaround was added in the mod_proxy_ftp module. On sites where
-mod_proxy_ftp is enabled and a forward proxy is configured, a
-cross-site scripting attack is possible against Web browsers which do
-not correctly derive the response character set following the rules in
-RFC 2616. 
-</p>
-</dd>
-<dd>
-  Reported to security team: 15th December 2007<br/>
-  Issue public: 8th January 2008<br/>
-  Update released: 19th January 2008<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>low: </b>
-<b>
-<name name="CVE-2007-6422">mod_proxy_balancer DoS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6422">CVE-2007-6422</a>
-<p>
+mod_proxy_ftp is enabled and a forward proxy is configured, a cross-site
+scripting attack is possible against Web browsers which do not correctly
+derive the response character set following the rules in RFC 2616.
+
+:    Reported to security team: 15th December 2007<br></br>Issue public:
+     8th January 2008<br></br>Update released:
+     19th January 2008<br></br>
+:    Affected: 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+:     **low:**	**<name name="CVE-2007-6422">mod_proxy_balancer
+      DoS</name>** 
+      [CVE-2007-6422](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6422) 
 A flaw was found in the mod_proxy_balancer module. On sites where
 mod_proxy_balancer is enabled, an authorized user could send a carefully
 crafted request that would cause the Apache child process handling that
 request to crash. This could lead to a denial of service if using a
-threaded Multi-Processing Module. </p>
-</dd>
-<dd>
-  Reported to security team: 12th December 2007<br/>
-  Issue public: 2nd January 2008<br/>
-  Update released: 19th January 2008<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>low: </b>
-<b>
-<name name="CVE-2007-6421">mod_proxy_balancer XSS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6421">CVE-2007-6421</a>
-<p>
+threaded Multi-Processing Module.
+
+:    Reported to security team: 12th December 2007<br></br>Issue public:
+     2nd January 2008<br></br>Update released:
+     19th January 2008<br></br>
+:    Affected: 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+:     **low:**	**<name name="CVE-2007-6421">mod_proxy_balancer
+      XSS</name>** 
+      [CVE-2007-6421](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6421) 
 A flaw was found in the mod_proxy_balancer module. On sites where
 mod_proxy_balancer is enabled, a cross-site scripting attack against an
-authorized user is possible. </p>
-</dd>
-<dd>
-  Reported to security team: 12th December 2007<br/>
-  Issue public: 2nd January 2008<br/>
-  Update released: 19th January 2008<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>moderate: </b>
-<b>
-<name name="CVE-2007-6388">mod_status XSS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6388">CVE-2007-6388</a>
-<p>
+authorized user is possible.
+
+:    Reported to security team: 12th December 2007<br></br>Issue public:
+     2nd January 2008<br></br>Update released:
+     19th January 2008<br></br>
+:    Affected: 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+:     **moderate:**  **<name name="CVE-2007-6388">mod_status XSS</name>** 
+      [CVE-2007-6388](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6388) 
 A flaw was found in the mod_status module. On sites where mod_status is
 enabled and the status pages were publicly accessible, a cross-site
-scripting attack is possible.
-Note that the server-status page is not enabled by default and it is best practice to not make this publicly available.</p>
-</dd>
-<dd>
-  Reported to security team: 15th December 2007<br/>
-  Issue public: 2nd January 2008<br/>
-  Update released: 19th January 2008<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>moderate: </b>
-<b>
-<name name="CVE-2007-5000">mod_imagemap XSS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000">CVE-2007-5000</a>
-<p>
-A flaw was found in the mod_imagemap module. On sites where
-mod_imagemap is enabled and an imagemap file is publicly available, a
-cross-site scripting attack is possible.</p>
-</dd>
-<dd>
-  Reported to security team: 23rd October 2007<br/>
-  Issue public: 11th December 2007<br/>
-  Update released: 19th January 2008<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-</dl>
-</section>
-<section id="2.2.6">
-<title>
-Fixed in Apache httpd 2.2.6</title>
-<dl>
-<dd>
-<b>moderate: </b>
-<b>
-<name name="CVE-2007-3847">mod_proxy crash</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3847">CVE-2007-3847</a>
-<p>
+scripting attack is possible. Note that the server-status page is not
+enabled by default and it is best practice to not make this publicly
+available.
+
+:    Reported to security team: 15th December 2007<br></br>Issue public:
+     2nd January 2008<br></br>Update released:
+     19th January 2008<br></br>
+:    Affected: 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+:     **moderate:**  **<name name="CVE-2007-5000">mod_imagemap XSS</name>**
+      
+      [CVE-2007-5000](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5000) 
+A flaw was found in the mod_imagemap module. On sites where mod_imagemap is
+enabled and an imagemap file is publicly available, a cross-site scripting
+attack is possible.
+
+:    Reported to security team: 23rd October 2007<br></br>Issue public:
+     11th December 2007<br></br>Update released:
+     19th January 2008<br></br>
+:    Affected: 2.2.6, 2.2.5, 2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+# Fixed in Apache httpd 2.2.6 # {#2.2.6}
+
+:     **moderate:**  **<name name="CVE-2007-3847">mod_proxy crash</name>** 
+      [CVE-2007-3847](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3847) 
 A flaw was found in the Apache HTTP Server mod_proxy module. On sites where
 a reverse proxy is configured, a remote attacker could send a carefully
 crafted request that would cause the Apache child process handling that
 request to crash. On sites where a forward proxy is configured, an attacker
 could cause a similar crash if a user could be persuaded to visit a
 malicious site using the proxy. This could lead to a denial of service if
-using a threaded Multi-Processing Module.</p>
-</dd>
-<dd>
-  Issue public: 10th December 2006<br/>
-  Update released: 7th September 2007<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>moderate: </b>
-<b>
-<name name="CVE-2006-5752">mod_status cross-site scripting</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752">CVE-2006-5752</a>
-<p>
-A flaw was found in the mod_status module. On sites where the
-server-status page is publicly accessible and ExtendedStatus is
-enabled this could lead to a cross-site scripting attack.
-Note that the server-status
-page is not enabled by default and it is best practice to not make
-this publicly available.</p>
-</dd>
-<dd>
-  Reported to security team: 19th October 2006<br/>
-  Issue public: 20th June 2007<br/>
-  Update released: 7th September 2007<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>moderate: </b>
-<b>
-<name name="CVE-2007-3304">Signals to arbitrary processes</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3304">CVE-2007-3304</a>
-<p>The Apache HTTP server did not verify that a process
-was an Apache child process before sending it signals. A local
-attacker with the ability to run scripts on the HTTP server could
-manipulate the scoreboard and cause arbitrary processes to be
-terminated which could lead to a denial of service.</p>
-</dd>
-<dd>
-  Reported to security team: 15th May 2006<br/>
-  Issue public: 19th June 2007<br/>
-  Update released: 7th September 2007<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-<dd>
-<b>moderate: </b>
-<b>
-<name name="CVE-2007-1862">mod_cache information leak</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1862">CVE-2007-1862</a>
-<p>The recall_headers function in mod_mem_cache in Apache 2.2.4 did not
-properly copy all levels of header data, which can cause Apache to
-return HTTP headers containing previously used data, which could be
-used by remote attackers to obtain potentially sensitive information.
-</p>
-</dd>
-<dd>
-  Reported to security team: 26th April 2007<br/>
-  Issue public: 1st June 2007<br/>
-  Update released: 7th September 2007<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.4<p/>
-</dd>
-<dd>
-<b>moderate: </b>
-<b>
-<name name="CVE-2007-1863">mod_cache proxy DoS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1863">CVE-2007-1863</a>
-<p>A bug was found in the mod_cache module. On sites where
-caching is enabled, a remote attacker could send a carefully crafted
-request that would cause the Apache child process handling that request to
-crash. This could lead to a denial of service if using a threaded
-Multi-Processing Module.</p>
-</dd>
-<dd>
-  Reported to security team: 2nd May 2007<br/>
-  Issue public: 18th June 2007<br/>
-  Update released: 7th September 2007<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.4, 2.2.3, 2.2.2, 2.2.0<p/>
-</dd>
-</dl>
-</section>
-<section id="2.2.3">
-<title>
-Fixed in Apache httpd 2.2.3</title>
-<dl>
-<dd>
-<b>important: </b>
-<b>
-<name name="CVE-2006-3747">mod_rewrite off-by-one error</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3747">CVE-2006-3747</a>
-<p>
-An off-by-one flaw exists in the Rewrite module, mod_rewrite.
-Depending on the manner in which Apache httpd was compiled, this
-software defect may result in a vulnerability which, in combination
-with certain types of Rewrite rules in the web server configuration
-files, could be triggered remotely.  For vulnerable builds, the nature
-of the vulnerability can be denial of service (crashing of web server
-processes) or potentially allow arbitrary code execution.
-</p>
-</dd>
-<dd>
-  Reported to security team: 21st July 2006<br/>
-  Issue public: 27th July 2006<br/>
-  Update released: 27th July 2006<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.2, 2.2.0<p/>
-</dd>
-</dl>
-</section>
-<section id="2.2.2">
-<title>
-Fixed in Apache httpd 2.2.2</title>
-<dl>
-<dd>
-<b>low: </b>
-<b>
-<name name="CVE-2005-3357">mod_ssl access control DoS</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3357">CVE-2005-3357</a>
-<p>
+using a threaded Multi-Processing Module.
+
+:    Issue public: 10th December 2006<br></br>Update released:
+     7th September 2007<br></br>
+:    Affected: 2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+:     **moderate:**  **<name name="CVE-2006-5752">mod_status cross-site
+      scripting</name>** 
+      [CVE-2006-5752](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5752) 
+A flaw was found in the mod_status module. On sites where the server-status
+page is publicly accessible and ExtendedStatus is enabled this could lead
+to a cross-site scripting attack. Note that the server-status page is not
+enabled by default and it is best practice to not make this publicly
+available.
+
+:    Reported to security team: 19th October 2006<br></br>Issue public:
+     20th June 2007<br></br>Update released:
+     7th September 2007<br></br>
+:    Affected: 2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+:     **moderate:**  **<name name="CVE-2007-3304">Signals to arbitrary
+      processes</name>** 
+      [CVE-2007-3304](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3304) 
+The Apache HTTP server did not verify that a process was an Apache child
+process before sending it signals. A local attacker with the ability to run
+scripts on the HTTP server could manipulate the scoreboard and cause
+arbitrary processes to be terminated which could lead to a denial of
+service.
+
+:    Reported to security team: 15th May 2006<br></br>Issue public:
+     19th June 2007<br></br>Update released:
+     7th September 2007<br></br>
+:    Affected: 2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+:     **moderate:**  **<name name="CVE-2007-1862">mod_cache information
+      leak</name>** 
+      [CVE-2007-1862](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1862) 
+The recall_headers function in mod_mem_cache in Apache 2.2.4 did not
+properly copy all levels of header data, which can cause Apache to return
+HTTP headers containing previously used data, which could be used by remote
+attackers to obtain potentially sensitive information.
+
+:    Reported to security team: 26th April 2007<br></br>Issue public:
+     1st June 2007<br></br>Update released: 7th September 2007<br></br>
+:    Affected: 2.2.4
+
+:     **moderate:**  **<name name="CVE-2007-1863">mod_cache proxy
+      DoS</name>** 
+      [CVE-2007-1863](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1863) 
+A bug was found in the mod_cache module. On sites where caching is enabled,
+a remote attacker could send a carefully crafted request that would cause
+the Apache child process handling that request to crash. This could lead to
+a denial of service if using a threaded Multi-Processing Module.
+
+:    Reported to security team: 2nd May 2007<br></br>Issue public:
+     18th June 2007<br></br>Update released:
+     7th September 2007<br></br>
+:    Affected: 2.2.4, 2.2.3, 2.2.2, 2.2.0
+
+# Fixed in Apache httpd 2.2.3 # {#2.2.3}
+
+:     **important:**  **<name name="CVE-2006-3747">mod_rewrite off-by-one
+      error</name>** 
+      [CVE-2006-3747](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3747) 
+An off-by-one flaw exists in the Rewrite module, mod_rewrite. Depending on
+the manner in which Apache httpd was compiled, this software defect may
+result in a vulnerability which, in combination with certain types of
+Rewrite rules in the web server configuration files, could be triggered
+remotely. For vulnerable builds, the nature of the vulnerability can be
+denial of service (crashing of web server processes) or potentially allow
+arbitrary code execution.
+
+:    Reported to security team: 21st July 2006<br></br>Issue public:
+     27th July 2006<br></br>Update released: 27th July 2006<br></br>
+:    Affected: 2.2.2, 2.2.0
+
+# Fixed in Apache httpd 2.2.2 # {#2.2.2}
+
+:     **low:**	**<name name="CVE-2005-3357">mod_ssl access control
+      DoS</name>** 
+      [CVE-2005-3357](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3357) 
 A NULL pointer dereference flaw in mod_ssl was discovered affecting server
 configurations where an SSL virtual host is configured with access control
 and a custom 400 error document. A remote attacker could send a carefully
 crafted request to trigger this issue which would lead to a crash. This
 crash would only be a denial of service if using the worker MPM.
-</p>
-</dd>
-<dd>
-  Reported to security team: 5th December 2005<br/>
-  Issue public: 12th December 2005<br/>
-  Update released: 1st May 2006<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.0<p/>
-</dd>
-<dd>
-<b>moderate: </b>
-<b>
-<name name="CVE-2005-3352">mod_imap Referer Cross-Site Scripting</name>
-</b>
-<a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3352">CVE-2005-3352</a>
-<p>
-A flaw in mod_imap when using the Referer directive with image maps.
-In certain site configurations a remote attacker could perform a cross-site
-scripting attack if a victim can be forced to visit a malicious 
-URL using certain web browsers.  
-</p>
-</dd>
-<dd>
-  Reported to security team: 1st November 2005<br/>
-  Issue public: 12th December 2005<br/>
-  Update released: 1st May 2006<br/>
-</dd>
-<dd>
-      Affected: 
-    2.2.0<p/>
-</dd>
-</dl>
-</section>
-</body>
-</document>
+
+:    Reported to security team: 5th December 2005<br></br>Issue public:
+     12th December 2005<br></br>Update released: 1st May 2006<br></br>
+:    Affected: 2.2.0
+
+:     **moderate:**  **<name name="CVE-2005-3352">mod_imap Referer
+      Cross-Site Scripting</name>** 
+      [CVE-2005-3352](http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3352) 
+A flaw in mod_imap when using the Referer directive with image maps. In
+certain site configurations a remote attacker could perform a cross-site
+scripting attack if a victim can be forced to visit a malicious URL using
+certain web browsers.
+
+:    Reported to security team: 1st November 2005<br></br>Issue public:
+     12th December 2005<br></br>Update released: 1st May 2006<br></br>
+:    Affected: 2.2.0
+



Mime
View raw message