Advisories
Mandriva Advisories
|
![]() |
Problem Description |
A number of vulnerabilities were discovered in Apache versions prior to
1.3.27. The first is regarding the use of shared memory (SHM) in
Apache. An attacker that is able to execute code as the UID of the
webserver (typically "apache") is able to send arbitrary processes a
USR1 signal as root. Using this vulnerability, the attacker can also
cause the Apache process to continously span more children processes,
thus causing a local DoS. Another vulnerability was discovered by
Matthew Murphy regarding a cross site scripting vulnerability in the
standard 404 error page. Finally, some buffer overflows were found in
the "ab" benchmark program that is included with Apache.
All of these vulnerabilities were fixed in Apache 1.3.27; the packages
provided have these fixes applied.
Update:
Packages for SNF7.2 are now available.
Updated Packages |
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0839
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0843
http://marc.theaimsgroup.com/?l=apache-httpd-users&m=103367270822891&w=2
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.