Ubuntu 8.04 LTS / 10.04 LTS / 11.10 / 12.04 LTS / 12.10 : apache2 vulnerabilities (USN-1765-1)

Ubuntu Security Notice (C) 2013 Canonical, Inc. / NASL script (C) 2013 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing a security-related patch.

Description :

Niels Heinen discovered that multiple modules incorrectly sanitized
certain strings, which could result in browsers becoming vulnerable to
cross-site scripting attacks when processing the output. With
cross-site scripting vulnerabilities, if a user were tricked into
viewing server output during a crafted server request, a remote
attacker could exploit this to modify the contents, or steal
confidential data (such as passwords), within the same domain.
(CVE-2012-3499, CVE-2012-4558)

It was discovered that the mod_proxy_ajp module incorrectly handled
error states. A remote attacker could use this issue to cause the
server to stop responding, resulting in a denial of service. This
issue only applied to Ubuntu 8.04 LTS, Ubuntu 10.04 LTS and Ubuntu
11.10. (CVE-2012-4557)

It was discovered that the apache2ctl script shipped in Ubuntu
packages incorrectly created the lock directory. A local attacker
could possibly use this issue to gain privileges. The symlink
protections in Ubuntu 11.10 and later should reduce this vulnerability
to a denial of service. (CVE-2013-1048).

Solution :

Update the affected apache2.2-common package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 65607 ()

Bugtraq ID:

CVE ID: CVE-2012-3499
CVE-2012-4557
CVE-2012-4558
CVE-2013-1048