Fedora 15 : httpd-2.2.22-1.fc15 (2012-1642)

This script is Copyright (C) 2012-2015 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing a security update.

Description :

This update contains the latest stable release of the Apace HTTP
Server, version 2.2.22. This release fixes various bugs, and the
following security issues :

- Reject requests where the request-URI does not match the
HTTP specification, preventing unexpected expansion of
target URLs in some reverse proxy configurations.
(CVE-2011-3368)

- Fix integer overflow in ap_pregsub() which, when the
mod_setenvif module is enabled, could allow local users
to gain privileges via a .htaccess file. (CVE-2011-3607)

- Resolve additional cases of URL rewriting with
ProxyPassMatch or RewriteRule, where particular
request-URIs could result in undesired backend network
exposure in some configurations. (CVE-2011-4317)

- mod_log_config: Fix segfault (crash) when the
'%{cookiename}C' log format string is in use and a
client sends a nameless, valueless cookie, causing a
denial of service. The issue existed since version
2.2.17. (CVE-2012-0021)

- Fix scoreboard issue which could allow an unprivileged
child process could cause the parent to crash at
shutdown rather than terminate cleanly. (CVE-2012-0031)

- Fixed an issue in error responses that could expose
'httpOnly' cookies when no custom ErrorDocument is
specified for status code 400. (CVE-2012-0053)

http://www.apache.org/dist/httpd/CHANGES_2.2.22

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://www.apache.org/dist/httpd/CHANGES_2.2.22
https://bugzilla.redhat.com/show_bug.cgi?id=785070
https://bugzilla.redhat.com/show_bug.cgi?id=787325
http://www.nessus.org/u?1200a082

Solution :

Update the affected httpd package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Fedora Local Security Checks

Nessus Plugin ID: 58252 ()

Bugtraq ID: 49957
50494
50802
51407
51705
51706

CVE ID: CVE-2011-3368
CVE-2011-3607
CVE-2011-4317
CVE-2012-0021
CVE-2012-0031
CVE-2012-0053

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now