Apache HTTP Server 1.3.42 Released
The Apache Software Foundation and the Apache HTTP Server Project are
pleased to announce the release of version 1.3.42 of the Apache HTTP
Server ("Apache"). This release is intended as the final release of
version 1.3 of the Apache HTTP Server, which has reached end of life
status.
There will be no more full releases of Apache HTTP Server 1.3.
However, critical security updates may be made available from the
following website:
http://www.apache.org/dist/httpd/patches/
Our thanks go to everyone who has helped make Apache HTTP Server 1.3
the most successful, and most used, webserver software on the planet!
This Announcement notes the significant changes in
1.3.42 as compared to 1.3.41.
This version of Apache is is principally a bug and security fix release.
The following moderate security flaw has been addressed:
* CVE-2010-0010 (cve.mitre.org)
mod_proxy: Prevent chunk-size integer overflow on platforms
where sizeof(int) < sizeof(long). Reported by Adam Zabrocki.
Please see the CHANGES_1.3.42 file in this directory for a full list
of changes for this version.
Apache 1.3.42 is the final stable release of the Apache 1.3 family. We
strongly recommend that users of all earlier versions, including 1.3
family releases, upgrade to to the current 2.2 version as soon as possible.
For information about how to upgrade, please see the documentation:
http://httpd.apache.org/docs/2.2/upgrading.html
Apache 1.3.42 is available for download from
http://httpd.apache.org/download.cgi
This service utilizes the network of mirrors listed at:
http://www.apache.org/mirrors/
Binary distributions may be available for your specific platform from
http://www.apache.org/dist/httpd/binaries/
Binaries distributed by the Apache HTTP Server Project are provided as a
courtesy by individual project contributors. The project makes no
commitment to release the Apache HTTP Server in binary form for any
particular platform, nor on any particular schedule.
IMPORTANT NOTE FOR APACHE USERS: Apache 1.3 was designed for Unix OS
variants. While the ports to non-Unix platforms (such as Win32, Netware or
OS2) will function for some applications, Apache 1.3 is not designed for
these platforms. Apache 2 was designed from the ground up for security,
stability, or performance issues across all modern operating systems.
Users of any non-Unix ports are strongly cautioned to move to Apache 2.
The Apache project no longer distributes non-Unix platform binaries from
the main download pages for Apache 1.3. If absolutely necessary, a binary
may be available at http://archive.apache.org/dist/httpd/.
Apache 1.3.42 Major changes
Security vulnerabilities
The main security vulnerabilities addressed in 1.3.42 are:
*) SECURITY: CVE-2010-0010 (cve.mitre.org)
mod_proxy: Prevent chunk-size integer overflow on platforms
where sizeof(int) < sizeof(long). Reported by Adam Zabrocki.
Bugfixes addressed in 1.3.42 are:
*) Protect logresolve from mismanaged DNS records that return
blank/null hostnames.
--
Colm MacCárthaigh
All posts by 007admin
CVE-2010-0295
lighttpd before 1.4.26, and 1.5.x, allocates a buffer for each read operation that occurs for a request, which allows remote attackers to cause a denial of service (memory consumption) by breaking a request into small pieces that are sent at a slow rate. (CVSS:5.0) (Last Update:2011-01-26)
Apache HTTP Server 2.3.5-alpha Released
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Apache HTTP Server 2.3.5-alpha Released
The Apache Software Foundation and the Apache HTTP Server Project are
pleased to announce the release of version 2.3.5-alpha of the Apache HTTP
Server ("Apache"). This version of Apache is principally an alpha release
to test new technology and features that are incompatible or too large for
the stable 2.2.x branch. This alpha release should not be presumed to
be compatible with binaries built against any prior or future version.
Apache HTTP Server 2.3.5-alpha is available for download from:
http://httpd.apache.org/download.cgi
Apache 2.3 offers numerous enhancements, improvements, and performance
boosts over the 2.2 codebase. For an overview of new features
introduced since 2.3 please see:
http://httpd.apache.org/docs/trunk/new_features_2_4.html
Please see the CHANGES_2.3 file, linked from the download page, for a
full list of changes.
This release includes the Apache Portable Runtime (APR) version 1.4.2
and APR-Util version 1.3.9 in a separate -deps tarball. The APR libraries
must be upgraded for all features of httpd to operate correctly.
This release builds on and extends the Apache 2.2 API. Modules written
for Apache 2.2 will need to be recompiled in order to run with Apache
2.3, and require minimal or no source code changes.
http://svn.apache.org/repos/asf/httpd/httpd/trunk/VERSIONING
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (Darwin)
iEYEARECAAYFAkth7HAACgkQ94h19kJyHwDjxwCeP4E1Xpts6XJO3wua1Hm2Ds8A
hi0An2MCpiAdVGKQLjrK5ixxzaAq1kIg
=+YL2
-----END PGP SIGNATURE-----
Critical Patch Update – January 2010
SA-CORE-2009-009 – Drupal Core – Cross site scripting
- Advisory ID: DRUPAL-SA-CORE-2009-009
- Project: Drupal core
- Version: 5.x, 6.x
- Date: 2009-December-16
- Security risk: Not critical
- Exploitable from: Remote
- Vulnerability: Cross site scripting
Description
Multiple vulnerabilities were discovered in Drupal.
Contact category name cross-site scripting
The Contact module does not correctly handle certain user input when displaying category information. Users privileged to create contact categories can insert arbitrary HTML and script code into the contact module administration page. Such a cross-site scripting attack may lead to the malicious user gaining administrative access. Wikipedia has more information about cross-site scripting (XSS).
This issue affects Drupal 6.x and Drupal 5.x.
Menu description cross-site scripting
The Menu module does not correctly handle certain user input when displaying the menu administration overview. Users privileged to create new menus can insert arbitrary HTML and script code into the menu module administration page. Such a cross-site scripting attack may lead to the malicious user gaining administrative access. Wikipedia has more information about cross-site scripting (XSS).
This issue affects Drupal 6.x only.
Versions affected
- Drupal 5.x before version 5.21.
- Drupal 6.x before version 6.15.
Solution
Install the latest version:
- If you are running Drupal 6.x then upgrade to Drupal 6.15.
- If you are running Drupal 5.x then upgrade to Drupal 5.21.
If you are unable to upgrade immediately, you can apply a patch to secure your installation until you are able to do a proper upgrade. Theses patches fix the security vulnerability, but do not contain other fixes which were released in Drupal 5.21 or Drupal 6.15.
- To patch Drupal 6.14 use SA-CORE-2009-009-6.14.patch.
- To patch Drupal 5.20 use SA-CORE-2009-009-5.20.patch.
Reported by
The contact category XSS issue was independently reported by mr.baileys and Justin Klein Keane.
The menu description XSS issue was reported by mr.baileys.
Fixed by
The contact category XSS issue was fixed by Justin Klein Keane and Dave Reid.
The menu description XSS issue was fixed by Gábor Hojtsy and Heine Deelstra.
Contact
The security team for Drupal can be reached at security at drupal.org or via the form at http://drupal.org/contact.
Conferma la tua richiesta di iscrizione a perlulivo
Ciao [email protected], Abbiamo ricevuto la tua richiesta di iscrizione al gruppo perlulivo uno dei gruppi che trovi su Yahoo! Gruppi, un servizio gratuito e facile da usare per creare ed entrare a far parte di tante community. Questa richiesta scade fra 7 giorni. PER ISCRIVERTI AL GRUPPO DEVI: 1) Andare su Yahoo! Gruppi cliccando su questo link: http://it.groups.yahoo.com/i?i=eecdlcvukwi1ahar5rvg4css40rxcxgk&e=announce-archive%40httpd%2Eapache%2Eorg (Se cliccando sul link non ti si apre una finestra di browser, prova a fare copiare l'indirizzo e incollarlo su una finestra di browser.) -OPPURE- 2) RISPONDI a questo messaggio e-mail cliccando su pulsante "Rispondi" e poi su quelli di "Invia" sul tuo programma di posta Se non hai richiesto questa iscrizione a perlulivo, o non desideri più completarla, ignora questo messaggio.. Ciao, Il team di Yahoo! Gruppi L'utilizzo di Yahoo! Gruppi è soggetto alle http://it.docs.yahoo.com/info/utos.html
CVE-2009-4186
Stack consumption vulnerability in Apple Safari 4.0.3 on Windows allows remote attackers to cause a denial of service (application crash) via a long URI value (aka url) in the Cascading Style Sheets (CSS) background property. (CVSS:9.3) (Last Update:2009-12-04)
CVE-2009-3896
src/http/ngx_http_parse.c in nginx (aka Engine X) 0.1.0 through 0.4.14, 0.5.x before 0.5.38, 0.6.x before 0.6.39, 0.7.x before 0.7.62, and 0.8.x before 0.8.14 allows remote attackers to cause a denial of service (NULL pointer dereference and worker process crash) via a long URI. (CVSS:5.0) (Last Update:2013-09-11)
CVE-2009-3898
Directory traversal vulnerability in src/http/modules/ngx_http_dav_module.c in nginx (aka Engine X) before 0.7.63, and 0.8.x before 0.8.17, allows remote authenticated users to create or overwrite arbitrary files via a .. (dot dot) in the Destination HTTP header for the WebDAV (1) COPY or (2) MOVE method. (CVSS:4.9) (Last Update:2012-06-08)
CVE-2009-3555 – apache/mod_ssl vulnerability and mitigation
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Subject: CVE-2009-3555 - apache/mod_ssl vulnerability and mitigation
Apache httpd is affected by CVE-2009-3555[1] (The SSL Injection
or MiM attack[2]).
The Apache httpd webserver relies on OpenSSL for the implementation of
the SSL/TLS protocol.
We strongly urge you to upgrade to OpenSSL 0.9.8l; and to be prepared
to deploy OpenSSL 0.9.8m as it becomes available[3].
Note that these are for short term and mid-term mitigation only; the
long term solution may well require a modification of the SSL and/or
TLS protocols[4].
For those who are not able to upgrade OpenSSL swiftly and/or for
those who need detailed logging - we recommend that you roll out
this patch[5]:
http://www.apache.org/dist/httpd/patches/
apply_to_2.2.14 CVE-2009-3555-2.2.patch
sha1: 28cd58f3758f1add39417333825b9d854f4f5f43
as soon as possible. This is a partial fix in lieu of the protocol
issues being addressed and further changes to OpenSSL. Like the
OpenSSL 0.9.8l stopgap measure this patch rejects
in-session renegotiation.
If you are unable to patch and unable to roll our a newer version of
OpenSSL, and you rely on Client Side Authentication with Certificates
then we recommend that you 1) ensure that you limit your configuration
to a single 'SSLClient require' on VirtualHost/Sever level and 2)
remove all other (re)negotiation/require directives. However this does
NOT fully protect you - it just curtails authentication in this
specific setting.
1: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
2: http://www.links.org/?p=780, http://extendedsubset.com/?p=8
3: http://www.openssl.org/source/
openssl-announce mailing list on
http://www.openssl.org/support/community.html
4: http://www.ietf.org/mail-archive/web/tls/current/msg03963.html
5: svn diff -r833581:833594 https://svn.apache.org/repos/asf/
httpd/httpd/trunk/modules/ssl
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (Darwin)
iQCVAwUBSvTOITGmPZbsFAuBAQKpXgQAgoBq0FjmnFwxBYjZQ05cPgHYzE+rBQHg
f142MZWXreBoZyB1pV2CJpmf7BWtmBKQgKIMwk3fWfRs33rvnjhEWjrMBFA4ID8J
0CBLmiwBVxLfCTj7YIBJ71VPn4Mw3iviiIUb1qrW0RaOjGgf4j2ffsapnlpR6lR9
JHDVPFBXl8s=
=OYuY
-----END PGP SIGNATURE-----