Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2008-0456 (GCVE-0-2008-0456)
Vulnerability from cvelistv5
- n/a
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T07:46:54.578Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20080122 Apache mod_negotiation Xss and Http Response Splitting", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/486847/100/0/threaded" }, { "name": "GLSA-200803-19", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200803-19.xml" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.apple.com/kb/HT3549" }, { "name": "1019256", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1019256" }, { "name": "3575", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3575" }, { "name": "35074", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/35074" }, { "name": "APPLE-SA-2009-05-12", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "apache-modnegotiation-response-splitting(39893)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39893" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.mindedsecurity.com/MSA01150108.html" }, { "name": "29348", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/29348" }, { "name": "TA09-133A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "RHSA-2013:0130", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0130.html" }, { "name": "ADV-2009-1297", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "27409", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/27409" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-01-22T00:00:00", "descriptions": [ { "lang": "en", "value": "CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) \"406 Not Acceptable\" or (2) \"300 Multiple Choices\" HTTP response when the extension is omitted in a request for the file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-06T10:07:46", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20080122 Apache mod_negotiation Xss and Http Response Splitting", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/486847/100/0/threaded" }, { "name": "GLSA-200803-19", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200803-19.xml" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.apple.com/kb/HT3549" }, { "name": "1019256", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1019256" }, { "name": "3575", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3575" }, { "name": "35074", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/35074" }, { "name": "APPLE-SA-2009-05-12", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "apache-modnegotiation-response-splitting(39893)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39893" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.mindedsecurity.com/MSA01150108.html" }, { "name": "29348", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/29348" }, { "name": "TA09-133A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "RHSA-2013:0130", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0130.html" }, { "name": "ADV-2009-1297", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "27409", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/27409" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0456", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) \"406 Not Acceptable\" or (2) \"300 Multiple Choices\" HTTP response when the extension is omitted in a request for the file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20080122 Apache mod_negotiation Xss and Http Response Splitting", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/486847/100/0/threaded" }, { "name": "GLSA-200803-19", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200803-19.xml" }, { "name": "http://support.apple.com/kb/HT3549", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3549" }, { "name": "1019256", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1019256" }, { "name": "3575", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3575" }, { "name": "35074", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35074" }, { "name": "APPLE-SA-2009-05-12", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "apache-modnegotiation-response-splitting(39893)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39893" }, { "name": "http://www.mindedsecurity.com/MSA01150108.html", "refsource": "MISC", "url": "http://www.mindedsecurity.com/MSA01150108.html" }, { "name": "29348", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29348" }, { "name": "TA09-133A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "RHSA-2013:0130", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0130.html" }, { "name": "ADV-2009-1297", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "27409", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27409" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-0456", "datePublished": "2008-01-25T00:00:00", "dateReserved": "2008-01-24T00:00:00", "dateUpdated": "2024-08-07T07:46:54.578Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2008-0456\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2008-01-25T01:00:00.000\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) \\\"406 Not Acceptable\\\" or (2) \\\"300 Multiple Choices\\\" HTTP response when the extension is omitted in a request for the file.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de inyecci\u00f3n CRLF (se refiere a CR (retorno de carro) y LF (salto de l\u00ednea)) en el m\u00f3dulo mod_negotiation de Apache HTTP Server 2.2.6 y anteriores en las series 2.2.x, 2.0.61 y anteriores en las series 2.0.x, y 1.3.39 y anteriores en las series 1.3.x permite a usuarios remotos autenticados inyectar cabeceras HTTP y llevar a cabo ataques de ruptura de respuestas HTTP subiendo un fichero con un nombre multi-l\u00ednea que contiene secuencias de cabeceras HTTP y una extensi\u00f3n de fichero, lo cual conduce a la inyecci\u00f3n en respuestas HTTP (1) \\\"406 Not Acceptable\\\" o (2) \\\"300 Multiple Choices\\\" al omitir la extensi\u00f3n en una petici\u00f3n al fichero.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:N/I:P/A:N\",\"baseScore\":2.6,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":4.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-74\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.2.0\",\"versionEndExcluding\":\"2.2.12\",\"matchCriteriaId\":\"8BBBCFC4-2CFE-42A2-BE6F-2710EB3921A9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133AAFA7-AF42-4D7B-8822-AA2E85611BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D669D4-6D7E-449D-80C1-28FA44F06FFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0AC5CD5-6E58-433C-9EB3-6DFE5656463E\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0130.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/29348\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35074\",\"source\":\"cve@mitre.org\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200803-19.xml\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/3575\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://securitytracker.com/id?1019256\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://support.apple.com/kb/HT3549\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mindedsecurity.com/MSA01150108.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/archive/1/486847/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/27409\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-133A.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1297\",\"source\":\"cve@mitre.org\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/39893\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/May/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2013-0130.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/29348\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/35074\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\",\"Third Party Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200803-19.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://securityreason.com/securityalert/3575\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://securitytracker.com/id?1019256\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://support.apple.com/kb/HT3549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mindedsecurity.com/MSA01150108.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/archive/1/486847/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/27409\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-133A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1297\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Third Party Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/39893\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}],\"vendorComments\":[{\"organization\":\"Red Hat\",\"comment\":\"We do not consider this issue to be security sensitive. Untrusted users should not be permitted to upload files to the directories from where they can be directly served by the web server without prior careful sanitation of both contents and filename.\",\"lastModified\":\"2008-01-25T00:00:00\"}]}}" } }
ghsa-fw9r-jq2r-wx56
Vulnerability from github
CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) "406 Not Acceptable" or (2) "300 Multiple Choices" HTTP response when the extension is omitted in a request for the file.
{ "affected": [], "aliases": [ "CVE-2008-0456" ], "database_specific": { "cwe_ids": [ "CWE-74", "CWE-94" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-01-25T01:00:00Z", "severity": "LOW" }, "details": "CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) \"406 Not Acceptable\" or (2) \"300 Multiple Choices\" HTTP response when the extension is omitted in a request for the file.", "id": "GHSA-fw9r-jq2r-wx56", "modified": "2025-04-09T03:50:45Z", "published": "2022-05-01T23:30:30Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0456" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39893" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2013-0130.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/29348" }, { "type": "WEB", "url": "http://secunia.com/advisories/35074" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200803-19.xml" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/3575" }, { "type": "WEB", "url": "http://securitytracker.com/id?1019256" }, { "type": "WEB", "url": "http://support.apple.com/kb/HT3549" }, { "type": "WEB", "url": "http://www.mindedsecurity.com/MSA01150108.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/486847/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/27409" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/1297" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2013_0130
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated httpd packages that fix multiple security issues, various bugs,\nand add enhancements are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages contain the Apache HTTP Server (httpd), which is the\nnamesake project of The Apache Software Foundation.\n\nInput sanitization flaws were found in the mod_negotiation module. A remote\nattacker able to upload or create files with arbitrary names in a directory\nthat has the MultiViews options enabled, could use these flaws to conduct\ncross-site scripting and HTTP response splitting attacks against users\nvisiting the site. (CVE-2008-0455, CVE-2008-0456, CVE-2012-2687)\n\nBug fixes:\n\n* Previously, no check was made to see if the\n/etc/pki/tls/private/localhost.key file was a valid key prior to running\nthe \"%post\" script for the \"mod_ssl\" package. Consequently, when\n/etc/pki/tls/certs/localhost.crt did not exist and \"localhost.key\" was\npresent but invalid, upgrading the Apache HTTP Server daemon (httpd) with\nmod_ssl failed. The \"%post\" script has been fixed to test for an existing\nSSL key. As a result, upgrading httpd with mod_ssl now proceeds as\nexpected. (BZ#752618)\n\n* The \"mod_ssl\" module did not support operation under FIPS mode.\nConsequently, when operating Red Hat Enterprise Linux 5 with FIPS mode\nenabled, httpd failed to start. An upstream patch has been applied to\ndisable non-FIPS functionality if operating under FIPS mode and httpd now\nstarts as expected. (BZ#773473)\n\n* Prior to this update, httpd exit status codes were not Linux Standard\nBase (LSB) compliant. When the command \"service httpd reload\" was run and\nhttpd failed, the exit status code returned was \"0\" and not in the range 1\nto 6 as expected. A patch has been applied to the init script and httpd now\nreturns \"1\" as an exit status code. (BZ#783242)\n\n* Chunked Transfer Coding is described in RFC 2616. Previously, the\nApache server did not correctly handle a chunked encoded POST request with\na \"chunk-size\" or \"chunk-extension\" value of 32 bytes or more.\nConsequently, when such a POST request was made the server did not respond.\nAn upstream patch has been applied and the problem no longer occurs.\n(BZ#840845)\n\n* Due to a regression, when mod_cache received a non-cacheable 304\nresponse, the headers were served incorrectly. Consequently, compressed\ndata could be returned to the client without the cached headers to indicate\nthe data was compressed. An upstream patch has been applied to merge\nresponse and cached headers before data from the cache is served to the\nclient. As a result, cached data is now correctly interpreted by the\nclient. (BZ#845532)\n\n* In a proxy configuration, certain response-line strings were not handled\ncorrectly. If a response-line without a \"description\" string was received\nfrom the origin server, for a non-standard status code, such as the \"450\"\nstatus code, a \"500 Internal Server Error\" would be returned to the client.\nThis bug has been fixed so that the original response line is returned to\nthe client. (BZ#853128)\n\nEnhancements:\n\n* The configuration directive \"LDAPReferrals\" is now supported in addition\nto the previously introduced \"LDAPChaseReferrals\". (BZ#727342)\n\n* The AJP support module for \"mod_proxy\", \"mod_proxy_ajp\", now supports the\n\"ProxyErrorOverride\" directive. Consequently, it is now possible to\nconfigure customized error pages for web applications running on a backend\nserver accessed via AJP. (BZ#767890)\n\n* The \"%posttrans\" scriptlet which automatically restarts the httpd service\nafter a package upgrade can now be disabled. If the file\n/etc/sysconfig/httpd-disable-posttrans exists, the scriptlet will not\nrestart the daemon. (BZ#833042)\n\n* The output of \"httpd -S\" now includes configured alias names for each\nvirtual host. (BZ#833043)\n\n* New certificate variable names are now exposed by \"mod_ssl\" using the\n\"_DN_userID\" suffix, such as \"SSL_CLIENT_S_DN_userID\", which use the\ncommonly used object identifier (OID) definition of \"userID\", OID\n0.9.2342.19200300.100.1.1. (BZ#840036)\n\nAll users of httpd are advised to upgrade to these updated packages, which\nfix these issues and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:0130", "url": "https://access.redhat.com/errata/RHSA-2013:0130" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "727342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=727342" }, { "category": "external", "summary": "752618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=752618" }, { "category": "external", "summary": "767890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=767890" }, { "category": "external", "summary": "773473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=773473" }, { "category": "external", "summary": "783242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783242" }, { "category": "external", "summary": "840845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840845" }, { "category": "external", "summary": "845532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845532" }, { "category": "external", "summary": "850794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850794" }, { "category": "external", "summary": "879292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879292" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0130.json" } ], "title": "Red Hat Security Advisory: httpd security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T05:34:03+00:00", "generator": { "date": "2024-11-22T05:34:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2013:0130", "initial_release_date": "2013-01-08T04:30:00+00:00", "revision_history": [ { "date": "2013-01-08T04:30:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-01-08T04:33:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:34:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.3-74.el5.i386", "product": { "name": "mod_ssl-1:2.2.3-74.el5.i386", "product_id": "mod_ssl-1:2.2.3-74.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.3-74.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.i386", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.i386", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=i386" } } }, { "category": "product_version", "name": "httpd-0:2.2.3-74.el5.i386", "product": { "name": "httpd-0:2.2.3-74.el5.i386", "product_id": "httpd-0:2.2.3-74.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-74.el5?arch=i386" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.i386", "product": { "name": "httpd-devel-0:2.2.3-74.el5.i386", "product_id": "httpd-devel-0:2.2.3-74.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=i386" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.3-74.el5.i386", "product": { "name": "httpd-manual-0:2.2.3-74.el5.i386", "product_id": "httpd-manual-0:2.2.3-74.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.3-74.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.3-74.el5.x86_64", "product": { "name": "mod_ssl-1:2.2.3-74.el5.x86_64", "product_id": "mod_ssl-1:2.2.3-74.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.3-74.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.x86_64", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.x86_64", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-0:2.2.3-74.el5.x86_64", "product": { "name": "httpd-0:2.2.3-74.el5.x86_64", "product_id": "httpd-0:2.2.3-74.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-74.el5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.x86_64", "product": { "name": "httpd-devel-0:2.2.3-74.el5.x86_64", "product_id": "httpd-devel-0:2.2.3-74.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.3-74.el5.x86_64", "product": { "name": "httpd-manual-0:2.2.3-74.el5.x86_64", "product_id": "httpd-manual-0:2.2.3-74.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.3-74.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.3-74.el5.src", "product": { "name": "httpd-0:2.2.3-74.el5.src", "product_id": "httpd-0:2.2.3-74.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-74.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.3-74.el5.ppc", "product": { "name": "mod_ssl-1:2.2.3-74.el5.ppc", "product_id": "mod_ssl-1:2.2.3-74.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.3-74.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=ppc" } } }, { "category": "product_version", "name": "httpd-0:2.2.3-74.el5.ppc", "product": { "name": "httpd-0:2.2.3-74.el5.ppc", "product_id": "httpd-0:2.2.3-74.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-74.el5?arch=ppc" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.ppc", "product": { "name": "httpd-devel-0:2.2.3-74.el5.ppc", "product_id": "httpd-devel-0:2.2.3-74.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=ppc" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.3-74.el5.ppc", "product": { "name": "httpd-manual-0:2.2.3-74.el5.ppc", "product_id": "httpd-manual-0:2.2.3-74.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.3-74.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc64", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc64", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.ppc64", "product": { "name": "httpd-devel-0:2.2.3-74.el5.ppc64", "product_id": "httpd-devel-0:2.2.3-74.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.3-74.el5.ia64", "product": { "name": "mod_ssl-1:2.2.3-74.el5.ia64", "product_id": "mod_ssl-1:2.2.3-74.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.3-74.el5?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.ia64", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ia64", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=ia64" } } }, { "category": "product_version", "name": "httpd-0:2.2.3-74.el5.ia64", "product": { "name": "httpd-0:2.2.3-74.el5.ia64", "product_id": "httpd-0:2.2.3-74.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-74.el5?arch=ia64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.ia64", "product": { "name": "httpd-devel-0:2.2.3-74.el5.ia64", "product_id": "httpd-devel-0:2.2.3-74.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=ia64" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.3-74.el5.ia64", "product": { "name": "httpd-manual-0:2.2.3-74.el5.ia64", "product_id": "httpd-manual-0:2.2.3-74.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.3-74.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.3-74.el5.s390x", "product": { "name": "mod_ssl-1:2.2.3-74.el5.s390x", "product_id": "mod_ssl-1:2.2.3-74.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.3-74.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.s390x", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390x", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=s390x" } } }, { "category": "product_version", "name": "httpd-0:2.2.3-74.el5.s390x", "product": { "name": "httpd-0:2.2.3-74.el5.s390x", "product_id": "httpd-0:2.2.3-74.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-74.el5?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.s390x", "product": { "name": "httpd-devel-0:2.2.3-74.el5.s390x", "product_id": "httpd-devel-0:2.2.3-74.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=s390x" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.3-74.el5.s390x", "product": { "name": "httpd-manual-0:2.2.3-74.el5.s390x", "product_id": "httpd-manual-0:2.2.3-74.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.3-74.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.s390", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=s390" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.s390", "product": { "name": "httpd-devel-0:2.2.3-74.el5.s390", "product_id": "httpd-devel-0:2.2.3-74.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-0:2.2.3-74.el5.src" }, "product_reference": "httpd-0:2.2.3-74.el5.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-0:2.2.3-74.el5.src" }, "product_reference": "httpd-0:2.2.3-74.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.ppc64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.s390" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-manual-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-manual-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-manual-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-manual-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-manual-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mod_ssl-1:2.2.3-74.el5.i386" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mod_ssl-1:2.2.3-74.el5.ia64" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mod_ssl-1:2.2.3-74.el5.ppc" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mod_ssl-1:2.2.3-74.el5.s390x" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mod_ssl-1:2.2.3-74.el5.x86_64" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-0:2.2.3-74.el5.src" }, "product_reference": "httpd-0:2.2.3-74.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.ppc64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.s390" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-manual-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-manual-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-manual-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-manual-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-manual-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mod_ssl-1:2.2.3-74.el5.i386" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mod_ssl-1:2.2.3-74.el5.ia64" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mod_ssl-1:2.2.3-74.el5.ppc" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mod_ssl-1:2.2.3-74.el5.s390x" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-0455", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2012-08-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "850794" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary web script or HTML by uploading a file with a name containing XSS sequences and a file extension, which leads to injection within a (1) \"406 Not Acceptable\" or (2) \"300 Multiple Choices\" HTTP response when the extension is omitted in a request for the file.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0455" }, { "category": "external", "summary": "RHBZ#850794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850794" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0455", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0455" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0455", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0455" } ], "release_date": "2012-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-01-08T04:30:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0130" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled" }, { "cve": "CVE-2008-0456", "discovery_date": "2008-01-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "879292" } ], "notes": [ { "category": "description", "text": "CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) \"406 Not Acceptable\" or (2) \"300 Multiple Choices\" HTTP response when the extension is omitted in a request for the file.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_negotiation CRLF injection via untrusted file names in directories with MultiViews enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0456" }, { "category": "external", "summary": "RHBZ#879292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879292" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0456", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0456" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0456", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0456" } ], "release_date": "2008-01-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-01-08T04:30:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0130" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_negotiation CRLF injection via untrusted file names in directories with MultiViews enabled" }, { "cve": "CVE-2012-2687", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2012-08-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "850794" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-2687" }, { "category": "external", "summary": "RHBZ#850794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850794" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-2687", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2687" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-2687", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2687" } ], "release_date": "2012-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-01-08T04:30:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0130" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled" } ] }
rhsa-2013:0130
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated httpd packages that fix multiple security issues, various bugs,\nand add enhancements are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages contain the Apache HTTP Server (httpd), which is the\nnamesake project of The Apache Software Foundation.\n\nInput sanitization flaws were found in the mod_negotiation module. A remote\nattacker able to upload or create files with arbitrary names in a directory\nthat has the MultiViews options enabled, could use these flaws to conduct\ncross-site scripting and HTTP response splitting attacks against users\nvisiting the site. (CVE-2008-0455, CVE-2008-0456, CVE-2012-2687)\n\nBug fixes:\n\n* Previously, no check was made to see if the\n/etc/pki/tls/private/localhost.key file was a valid key prior to running\nthe \"%post\" script for the \"mod_ssl\" package. Consequently, when\n/etc/pki/tls/certs/localhost.crt did not exist and \"localhost.key\" was\npresent but invalid, upgrading the Apache HTTP Server daemon (httpd) with\nmod_ssl failed. The \"%post\" script has been fixed to test for an existing\nSSL key. As a result, upgrading httpd with mod_ssl now proceeds as\nexpected. (BZ#752618)\n\n* The \"mod_ssl\" module did not support operation under FIPS mode.\nConsequently, when operating Red Hat Enterprise Linux 5 with FIPS mode\nenabled, httpd failed to start. An upstream patch has been applied to\ndisable non-FIPS functionality if operating under FIPS mode and httpd now\nstarts as expected. (BZ#773473)\n\n* Prior to this update, httpd exit status codes were not Linux Standard\nBase (LSB) compliant. When the command \"service httpd reload\" was run and\nhttpd failed, the exit status code returned was \"0\" and not in the range 1\nto 6 as expected. A patch has been applied to the init script and httpd now\nreturns \"1\" as an exit status code. (BZ#783242)\n\n* Chunked Transfer Coding is described in RFC 2616. Previously, the\nApache server did not correctly handle a chunked encoded POST request with\na \"chunk-size\" or \"chunk-extension\" value of 32 bytes or more.\nConsequently, when such a POST request was made the server did not respond.\nAn upstream patch has been applied and the problem no longer occurs.\n(BZ#840845)\n\n* Due to a regression, when mod_cache received a non-cacheable 304\nresponse, the headers were served incorrectly. Consequently, compressed\ndata could be returned to the client without the cached headers to indicate\nthe data was compressed. An upstream patch has been applied to merge\nresponse and cached headers before data from the cache is served to the\nclient. As a result, cached data is now correctly interpreted by the\nclient. (BZ#845532)\n\n* In a proxy configuration, certain response-line strings were not handled\ncorrectly. If a response-line without a \"description\" string was received\nfrom the origin server, for a non-standard status code, such as the \"450\"\nstatus code, a \"500 Internal Server Error\" would be returned to the client.\nThis bug has been fixed so that the original response line is returned to\nthe client. (BZ#853128)\n\nEnhancements:\n\n* The configuration directive \"LDAPReferrals\" is now supported in addition\nto the previously introduced \"LDAPChaseReferrals\". (BZ#727342)\n\n* The AJP support module for \"mod_proxy\", \"mod_proxy_ajp\", now supports the\n\"ProxyErrorOverride\" directive. Consequently, it is now possible to\nconfigure customized error pages for web applications running on a backend\nserver accessed via AJP. (BZ#767890)\n\n* The \"%posttrans\" scriptlet which automatically restarts the httpd service\nafter a package upgrade can now be disabled. If the file\n/etc/sysconfig/httpd-disable-posttrans exists, the scriptlet will not\nrestart the daemon. (BZ#833042)\n\n* The output of \"httpd -S\" now includes configured alias names for each\nvirtual host. (BZ#833043)\n\n* New certificate variable names are now exposed by \"mod_ssl\" using the\n\"_DN_userID\" suffix, such as \"SSL_CLIENT_S_DN_userID\", which use the\ncommonly used object identifier (OID) definition of \"userID\", OID\n0.9.2342.19200300.100.1.1. (BZ#840036)\n\nAll users of httpd are advised to upgrade to these updated packages, which\nfix these issues and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:0130", "url": "https://access.redhat.com/errata/RHSA-2013:0130" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "727342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=727342" }, { "category": "external", "summary": "752618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=752618" }, { "category": "external", "summary": "767890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=767890" }, { "category": "external", "summary": "773473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=773473" }, { "category": "external", "summary": "783242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783242" }, { "category": "external", "summary": "840845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840845" }, { "category": "external", "summary": "845532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845532" }, { "category": "external", "summary": "850794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850794" }, { "category": "external", "summary": "879292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879292" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0130.json" } ], "title": "Red Hat Security Advisory: httpd security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-10-09T13:07:07+00:00", "generator": { "date": "2025-10-09T13:07:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2013:0130", "initial_release_date": "2013-01-08T04:30:00+00:00", "revision_history": [ { "date": "2013-01-08T04:30:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-01-08T04:33:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T13:07:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.3-74.el5.i386", "product": { "name": "mod_ssl-1:2.2.3-74.el5.i386", "product_id": "mod_ssl-1:2.2.3-74.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.3-74.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.i386", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.i386", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=i386" } } }, { "category": "product_version", "name": "httpd-0:2.2.3-74.el5.i386", "product": { "name": "httpd-0:2.2.3-74.el5.i386", "product_id": "httpd-0:2.2.3-74.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-74.el5?arch=i386" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.i386", "product": { "name": "httpd-devel-0:2.2.3-74.el5.i386", "product_id": "httpd-devel-0:2.2.3-74.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=i386" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.3-74.el5.i386", "product": { "name": "httpd-manual-0:2.2.3-74.el5.i386", "product_id": "httpd-manual-0:2.2.3-74.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.3-74.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.3-74.el5.x86_64", "product": { "name": "mod_ssl-1:2.2.3-74.el5.x86_64", "product_id": "mod_ssl-1:2.2.3-74.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.3-74.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.x86_64", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.x86_64", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-0:2.2.3-74.el5.x86_64", "product": { "name": "httpd-0:2.2.3-74.el5.x86_64", "product_id": "httpd-0:2.2.3-74.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-74.el5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.x86_64", "product": { "name": "httpd-devel-0:2.2.3-74.el5.x86_64", "product_id": "httpd-devel-0:2.2.3-74.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.3-74.el5.x86_64", "product": { "name": "httpd-manual-0:2.2.3-74.el5.x86_64", "product_id": "httpd-manual-0:2.2.3-74.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.3-74.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.3-74.el5.src", "product": { "name": "httpd-0:2.2.3-74.el5.src", "product_id": "httpd-0:2.2.3-74.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-74.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.3-74.el5.ppc", "product": { "name": "mod_ssl-1:2.2.3-74.el5.ppc", "product_id": "mod_ssl-1:2.2.3-74.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.3-74.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=ppc" } } }, { "category": "product_version", "name": "httpd-0:2.2.3-74.el5.ppc", "product": { "name": "httpd-0:2.2.3-74.el5.ppc", "product_id": "httpd-0:2.2.3-74.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-74.el5?arch=ppc" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.ppc", "product": { "name": "httpd-devel-0:2.2.3-74.el5.ppc", "product_id": "httpd-devel-0:2.2.3-74.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=ppc" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.3-74.el5.ppc", "product": { "name": "httpd-manual-0:2.2.3-74.el5.ppc", "product_id": "httpd-manual-0:2.2.3-74.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.3-74.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc64", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc64", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.ppc64", "product": { "name": "httpd-devel-0:2.2.3-74.el5.ppc64", "product_id": "httpd-devel-0:2.2.3-74.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.3-74.el5.ia64", "product": { "name": "mod_ssl-1:2.2.3-74.el5.ia64", "product_id": "mod_ssl-1:2.2.3-74.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.3-74.el5?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.ia64", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ia64", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=ia64" } } }, { "category": "product_version", "name": "httpd-0:2.2.3-74.el5.ia64", "product": { "name": "httpd-0:2.2.3-74.el5.ia64", "product_id": "httpd-0:2.2.3-74.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-74.el5?arch=ia64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.ia64", "product": { "name": "httpd-devel-0:2.2.3-74.el5.ia64", "product_id": "httpd-devel-0:2.2.3-74.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=ia64" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.3-74.el5.ia64", "product": { "name": "httpd-manual-0:2.2.3-74.el5.ia64", "product_id": "httpd-manual-0:2.2.3-74.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.3-74.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.3-74.el5.s390x", "product": { "name": "mod_ssl-1:2.2.3-74.el5.s390x", "product_id": "mod_ssl-1:2.2.3-74.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.3-74.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.s390x", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390x", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=s390x" } } }, { "category": "product_version", "name": "httpd-0:2.2.3-74.el5.s390x", "product": { "name": "httpd-0:2.2.3-74.el5.s390x", "product_id": "httpd-0:2.2.3-74.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-74.el5?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.s390x", "product": { "name": "httpd-devel-0:2.2.3-74.el5.s390x", "product_id": "httpd-devel-0:2.2.3-74.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=s390x" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.3-74.el5.s390x", "product": { "name": "httpd-manual-0:2.2.3-74.el5.s390x", "product_id": "httpd-manual-0:2.2.3-74.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.3-74.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.s390", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=s390" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.s390", "product": { "name": "httpd-devel-0:2.2.3-74.el5.s390", "product_id": "httpd-devel-0:2.2.3-74.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-0:2.2.3-74.el5.src" }, "product_reference": "httpd-0:2.2.3-74.el5.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-0:2.2.3-74.el5.src" }, "product_reference": "httpd-0:2.2.3-74.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.ppc64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.s390" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-manual-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-manual-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-manual-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-manual-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-manual-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mod_ssl-1:2.2.3-74.el5.i386" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mod_ssl-1:2.2.3-74.el5.ia64" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mod_ssl-1:2.2.3-74.el5.ppc" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mod_ssl-1:2.2.3-74.el5.s390x" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mod_ssl-1:2.2.3-74.el5.x86_64" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-0:2.2.3-74.el5.src" }, "product_reference": "httpd-0:2.2.3-74.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.ppc64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.s390" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-manual-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-manual-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-manual-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-manual-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-manual-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mod_ssl-1:2.2.3-74.el5.i386" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mod_ssl-1:2.2.3-74.el5.ia64" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mod_ssl-1:2.2.3-74.el5.ppc" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mod_ssl-1:2.2.3-74.el5.s390x" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-0455", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2012-08-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "850794" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary web script or HTML by uploading a file with a name containing XSS sequences and a file extension, which leads to injection within a (1) \"406 Not Acceptable\" or (2) \"300 Multiple Choices\" HTTP response when the extension is omitted in a request for the file.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0455" }, { "category": "external", "summary": "RHBZ#850794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850794" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0455", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0455" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0455", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0455" } ], "release_date": "2012-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-01-08T04:30:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0130" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled" }, { "cve": "CVE-2008-0456", "discovery_date": "2008-01-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "879292" } ], "notes": [ { "category": "description", "text": "CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) \"406 Not Acceptable\" or (2) \"300 Multiple Choices\" HTTP response when the extension is omitted in a request for the file.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_negotiation CRLF injection via untrusted file names in directories with MultiViews enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0456" }, { "category": "external", "summary": "RHBZ#879292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879292" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0456", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0456" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0456", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0456" } ], "release_date": "2008-01-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-01-08T04:30:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0130" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_negotiation CRLF injection via untrusted file names in directories with MultiViews enabled" }, { "cve": "CVE-2012-2687", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2012-08-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "850794" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-2687" }, { "category": "external", "summary": "RHBZ#850794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850794" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-2687", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2687" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-2687", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2687" } ], "release_date": "2012-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-01-08T04:30:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0130" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled" } ] }
RHSA-2013:0130
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated httpd packages that fix multiple security issues, various bugs,\nand add enhancements are now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The httpd packages contain the Apache HTTP Server (httpd), which is the\nnamesake project of The Apache Software Foundation.\n\nInput sanitization flaws were found in the mod_negotiation module. A remote\nattacker able to upload or create files with arbitrary names in a directory\nthat has the MultiViews options enabled, could use these flaws to conduct\ncross-site scripting and HTTP response splitting attacks against users\nvisiting the site. (CVE-2008-0455, CVE-2008-0456, CVE-2012-2687)\n\nBug fixes:\n\n* Previously, no check was made to see if the\n/etc/pki/tls/private/localhost.key file was a valid key prior to running\nthe \"%post\" script for the \"mod_ssl\" package. Consequently, when\n/etc/pki/tls/certs/localhost.crt did not exist and \"localhost.key\" was\npresent but invalid, upgrading the Apache HTTP Server daemon (httpd) with\nmod_ssl failed. The \"%post\" script has been fixed to test for an existing\nSSL key. As a result, upgrading httpd with mod_ssl now proceeds as\nexpected. (BZ#752618)\n\n* The \"mod_ssl\" module did not support operation under FIPS mode.\nConsequently, when operating Red Hat Enterprise Linux 5 with FIPS mode\nenabled, httpd failed to start. An upstream patch has been applied to\ndisable non-FIPS functionality if operating under FIPS mode and httpd now\nstarts as expected. (BZ#773473)\n\n* Prior to this update, httpd exit status codes were not Linux Standard\nBase (LSB) compliant. When the command \"service httpd reload\" was run and\nhttpd failed, the exit status code returned was \"0\" and not in the range 1\nto 6 as expected. A patch has been applied to the init script and httpd now\nreturns \"1\" as an exit status code. (BZ#783242)\n\n* Chunked Transfer Coding is described in RFC 2616. Previously, the\nApache server did not correctly handle a chunked encoded POST request with\na \"chunk-size\" or \"chunk-extension\" value of 32 bytes or more.\nConsequently, when such a POST request was made the server did not respond.\nAn upstream patch has been applied and the problem no longer occurs.\n(BZ#840845)\n\n* Due to a regression, when mod_cache received a non-cacheable 304\nresponse, the headers were served incorrectly. Consequently, compressed\ndata could be returned to the client without the cached headers to indicate\nthe data was compressed. An upstream patch has been applied to merge\nresponse and cached headers before data from the cache is served to the\nclient. As a result, cached data is now correctly interpreted by the\nclient. (BZ#845532)\n\n* In a proxy configuration, certain response-line strings were not handled\ncorrectly. If a response-line without a \"description\" string was received\nfrom the origin server, for a non-standard status code, such as the \"450\"\nstatus code, a \"500 Internal Server Error\" would be returned to the client.\nThis bug has been fixed so that the original response line is returned to\nthe client. (BZ#853128)\n\nEnhancements:\n\n* The configuration directive \"LDAPReferrals\" is now supported in addition\nto the previously introduced \"LDAPChaseReferrals\". (BZ#727342)\n\n* The AJP support module for \"mod_proxy\", \"mod_proxy_ajp\", now supports the\n\"ProxyErrorOverride\" directive. Consequently, it is now possible to\nconfigure customized error pages for web applications running on a backend\nserver accessed via AJP. (BZ#767890)\n\n* The \"%posttrans\" scriptlet which automatically restarts the httpd service\nafter a package upgrade can now be disabled. If the file\n/etc/sysconfig/httpd-disable-posttrans exists, the scriptlet will not\nrestart the daemon. (BZ#833042)\n\n* The output of \"httpd -S\" now includes configured alias names for each\nvirtual host. (BZ#833043)\n\n* New certificate variable names are now exposed by \"mod_ssl\" using the\n\"_DN_userID\" suffix, such as \"SSL_CLIENT_S_DN_userID\", which use the\ncommonly used object identifier (OID) definition of \"userID\", OID\n0.9.2342.19200300.100.1.1. (BZ#840036)\n\nAll users of httpd are advised to upgrade to these updated packages, which\nfix these issues and add these enhancements.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:0130", "url": "https://access.redhat.com/errata/RHSA-2013:0130" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "727342", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=727342" }, { "category": "external", "summary": "752618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=752618" }, { "category": "external", "summary": "767890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=767890" }, { "category": "external", "summary": "773473", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=773473" }, { "category": "external", "summary": "783242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=783242" }, { "category": "external", "summary": "840845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840845" }, { "category": "external", "summary": "845532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=845532" }, { "category": "external", "summary": "850794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850794" }, { "category": "external", "summary": "879292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879292" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0130.json" } ], "title": "Red Hat Security Advisory: httpd security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-10-09T13:07:07+00:00", "generator": { "date": "2025-10-09T13:07:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2013:0130", "initial_release_date": "2013-01-08T04:30:00+00:00", "revision_history": [ { "date": "2013-01-08T04:30:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-01-08T04:33:40+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T13:07:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.3-74.el5.i386", "product": { "name": "mod_ssl-1:2.2.3-74.el5.i386", "product_id": "mod_ssl-1:2.2.3-74.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.3-74.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.i386", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.i386", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=i386" } } }, { "category": "product_version", "name": "httpd-0:2.2.3-74.el5.i386", "product": { "name": "httpd-0:2.2.3-74.el5.i386", "product_id": "httpd-0:2.2.3-74.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-74.el5?arch=i386" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.i386", "product": { "name": "httpd-devel-0:2.2.3-74.el5.i386", "product_id": "httpd-devel-0:2.2.3-74.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=i386" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.3-74.el5.i386", "product": { "name": "httpd-manual-0:2.2.3-74.el5.i386", "product_id": "httpd-manual-0:2.2.3-74.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.3-74.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.3-74.el5.x86_64", "product": { "name": "mod_ssl-1:2.2.3-74.el5.x86_64", "product_id": "mod_ssl-1:2.2.3-74.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.3-74.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.x86_64", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.x86_64", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-0:2.2.3-74.el5.x86_64", "product": { "name": "httpd-0:2.2.3-74.el5.x86_64", "product_id": "httpd-0:2.2.3-74.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-74.el5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.x86_64", "product": { "name": "httpd-devel-0:2.2.3-74.el5.x86_64", "product_id": "httpd-devel-0:2.2.3-74.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=x86_64" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.3-74.el5.x86_64", "product": { "name": "httpd-manual-0:2.2.3-74.el5.x86_64", "product_id": "httpd-manual-0:2.2.3-74.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.3-74.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "httpd-0:2.2.3-74.el5.src", "product": { "name": "httpd-0:2.2.3-74.el5.src", "product_id": "httpd-0:2.2.3-74.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-74.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.3-74.el5.ppc", "product": { "name": "mod_ssl-1:2.2.3-74.el5.ppc", "product_id": "mod_ssl-1:2.2.3-74.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.3-74.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=ppc" } } }, { "category": "product_version", "name": "httpd-0:2.2.3-74.el5.ppc", "product": { "name": "httpd-0:2.2.3-74.el5.ppc", "product_id": "httpd-0:2.2.3-74.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-74.el5?arch=ppc" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.ppc", "product": { "name": "httpd-devel-0:2.2.3-74.el5.ppc", "product_id": "httpd-devel-0:2.2.3-74.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=ppc" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.3-74.el5.ppc", "product": { "name": "httpd-manual-0:2.2.3-74.el5.ppc", "product_id": "httpd-manual-0:2.2.3-74.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.3-74.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc64", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc64", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=ppc64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.ppc64", "product": { "name": "httpd-devel-0:2.2.3-74.el5.ppc64", "product_id": "httpd-devel-0:2.2.3-74.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.3-74.el5.ia64", "product": { "name": "mod_ssl-1:2.2.3-74.el5.ia64", "product_id": "mod_ssl-1:2.2.3-74.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.3-74.el5?arch=ia64\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.ia64", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ia64", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=ia64" } } }, { "category": "product_version", "name": "httpd-0:2.2.3-74.el5.ia64", "product": { "name": "httpd-0:2.2.3-74.el5.ia64", "product_id": "httpd-0:2.2.3-74.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-74.el5?arch=ia64" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.ia64", "product": { "name": "httpd-devel-0:2.2.3-74.el5.ia64", "product_id": "httpd-devel-0:2.2.3-74.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=ia64" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.3-74.el5.ia64", "product": { "name": "httpd-manual-0:2.2.3-74.el5.ia64", "product_id": "httpd-manual-0:2.2.3-74.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.3-74.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "mod_ssl-1:2.2.3-74.el5.s390x", "product": { "name": "mod_ssl-1:2.2.3-74.el5.s390x", "product_id": "mod_ssl-1:2.2.3-74.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mod_ssl@2.2.3-74.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.s390x", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390x", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=s390x" } } }, { "category": "product_version", "name": "httpd-0:2.2.3-74.el5.s390x", "product": { "name": "httpd-0:2.2.3-74.el5.s390x", "product_id": "httpd-0:2.2.3-74.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd@2.2.3-74.el5?arch=s390x" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.s390x", "product": { "name": "httpd-devel-0:2.2.3-74.el5.s390x", "product_id": "httpd-devel-0:2.2.3-74.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=s390x" } } }, { "category": "product_version", "name": "httpd-manual-0:2.2.3-74.el5.s390x", "product": { "name": "httpd-manual-0:2.2.3-74.el5.s390x", "product_id": "httpd-manual-0:2.2.3-74.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-manual@2.2.3-74.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "httpd-debuginfo-0:2.2.3-74.el5.s390", "product": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390", "product_id": "httpd-debuginfo-0:2.2.3-74.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-74.el5?arch=s390" } } }, { "category": "product_version", "name": "httpd-devel-0:2.2.3-74.el5.s390", "product": { "name": "httpd-devel-0:2.2.3-74.el5.s390", "product_id": "httpd-devel-0:2.2.3-74.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/httpd-devel@2.2.3-74.el5?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-0:2.2.3-74.el5.src" }, "product_reference": "httpd-0:2.2.3-74.el5.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ppc64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.s390", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-0:2.2.3-74.el5.src" }, "product_reference": "httpd-0:2.2.3-74.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.ppc64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.s390" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-devel-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-manual-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-manual-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-manual-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-manual-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:httpd-manual-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mod_ssl-1:2.2.3-74.el5.i386" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mod_ssl-1:2.2.3-74.el5.ia64" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mod_ssl-1:2.2.3-74.el5.ppc" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mod_ssl-1:2.2.3-74.el5.s390x" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:mod_ssl-1:2.2.3-74.el5.x86_64" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-0:2.2.3-74.el5.src" }, "product_reference": "httpd-0:2.2.3-74.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-debuginfo-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-debuginfo-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.ppc64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.s390" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-devel-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-devel-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-devel-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-manual-0:2.2.3-74.el5.i386" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-manual-0:2.2.3-74.el5.ia64" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-manual-0:2.2.3-74.el5.ppc" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-manual-0:2.2.3-74.el5.s390x" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "httpd-manual-0:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:httpd-manual-0:2.2.3-74.el5.x86_64" }, "product_reference": "httpd-manual-0:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mod_ssl-1:2.2.3-74.el5.i386" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mod_ssl-1:2.2.3-74.el5.ia64" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mod_ssl-1:2.2.3-74.el5.ppc" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mod_ssl-1:2.2.3-74.el5.s390x" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "mod_ssl-1:2.2.3-74.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" }, "product_reference": "mod_ssl-1:2.2.3-74.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-0455", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2012-08-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "850794" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary web script or HTML by uploading a file with a name containing XSS sequences and a file extension, which leads to injection within a (1) \"406 Not Acceptable\" or (2) \"300 Multiple Choices\" HTTP response when the extension is omitted in a request for the file.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0455" }, { "category": "external", "summary": "RHBZ#850794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850794" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0455", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0455" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0455", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0455" } ], "release_date": "2012-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-01-08T04:30:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0130" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled" }, { "cve": "CVE-2008-0456", "discovery_date": "2008-01-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "879292" } ], "notes": [ { "category": "description", "text": "CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) \"406 Not Acceptable\" or (2) \"300 Multiple Choices\" HTTP response when the extension is omitted in a request for the file.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_negotiation CRLF injection via untrusted file names in directories with MultiViews enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-0456" }, { "category": "external", "summary": "RHBZ#879292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=879292" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-0456", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0456" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0456", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0456" } ], "release_date": "2008-01-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-01-08T04:30:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0130" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_negotiation CRLF injection via untrusted file names in directories with MultiViews enabled" }, { "cve": "CVE-2012-2687", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2012-08-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "850794" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-2687" }, { "category": "external", "summary": "RHBZ#850794", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=850794" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-2687", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2687" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-2687", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2687" } ], "release_date": "2012-06-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-01-08T04:30:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0130" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client-Workstation:httpd-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-0:2.2.3-74.el5.src", "5Client-Workstation:httpd-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.i386", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ia64", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.ppc", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.s390x", "5Client-Workstation:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.i386", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ia64", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.ppc", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.s390x", "5Client-Workstation:mod_ssl-1:2.2.3-74.el5.x86_64", "5Client:httpd-0:2.2.3-74.el5.i386", "5Client:httpd-0:2.2.3-74.el5.ia64", "5Client:httpd-0:2.2.3-74.el5.ppc", "5Client:httpd-0:2.2.3-74.el5.s390x", "5Client:httpd-0:2.2.3-74.el5.src", "5Client:httpd-0:2.2.3-74.el5.x86_64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Client:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Client:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Client:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Client:httpd-devel-0:2.2.3-74.el5.i386", "5Client:httpd-devel-0:2.2.3-74.el5.ia64", "5Client:httpd-devel-0:2.2.3-74.el5.ppc", "5Client:httpd-devel-0:2.2.3-74.el5.ppc64", "5Client:httpd-devel-0:2.2.3-74.el5.s390", "5Client:httpd-devel-0:2.2.3-74.el5.s390x", "5Client:httpd-devel-0:2.2.3-74.el5.x86_64", "5Client:httpd-manual-0:2.2.3-74.el5.i386", "5Client:httpd-manual-0:2.2.3-74.el5.ia64", "5Client:httpd-manual-0:2.2.3-74.el5.ppc", "5Client:httpd-manual-0:2.2.3-74.el5.s390x", "5Client:httpd-manual-0:2.2.3-74.el5.x86_64", "5Client:mod_ssl-1:2.2.3-74.el5.i386", "5Client:mod_ssl-1:2.2.3-74.el5.ia64", "5Client:mod_ssl-1:2.2.3-74.el5.ppc", "5Client:mod_ssl-1:2.2.3-74.el5.s390x", "5Client:mod_ssl-1:2.2.3-74.el5.x86_64", "5Server:httpd-0:2.2.3-74.el5.i386", "5Server:httpd-0:2.2.3-74.el5.ia64", "5Server:httpd-0:2.2.3-74.el5.ppc", "5Server:httpd-0:2.2.3-74.el5.s390x", "5Server:httpd-0:2.2.3-74.el5.src", "5Server:httpd-0:2.2.3-74.el5.x86_64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.i386", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ia64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc", "5Server:httpd-debuginfo-0:2.2.3-74.el5.ppc64", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390", "5Server:httpd-debuginfo-0:2.2.3-74.el5.s390x", "5Server:httpd-debuginfo-0:2.2.3-74.el5.x86_64", "5Server:httpd-devel-0:2.2.3-74.el5.i386", "5Server:httpd-devel-0:2.2.3-74.el5.ia64", "5Server:httpd-devel-0:2.2.3-74.el5.ppc", "5Server:httpd-devel-0:2.2.3-74.el5.ppc64", "5Server:httpd-devel-0:2.2.3-74.el5.s390", "5Server:httpd-devel-0:2.2.3-74.el5.s390x", "5Server:httpd-devel-0:2.2.3-74.el5.x86_64", "5Server:httpd-manual-0:2.2.3-74.el5.i386", "5Server:httpd-manual-0:2.2.3-74.el5.ia64", "5Server:httpd-manual-0:2.2.3-74.el5.ppc", "5Server:httpd-manual-0:2.2.3-74.el5.s390x", "5Server:httpd-manual-0:2.2.3-74.el5.x86_64", "5Server:mod_ssl-1:2.2.3-74.el5.i386", "5Server:mod_ssl-1:2.2.3-74.el5.ia64", "5Server:mod_ssl-1:2.2.3-74.el5.ppc", "5Server:mod_ssl-1:2.2.3-74.el5.s390x", "5Server:mod_ssl-1:2.2.3-74.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "httpd: mod_negotiation XSS via untrusted file names in directories with MultiViews enabled" } ] }
fkie_cve-2008-0456
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
cve@mitre.org | http://lists.apple.com/archives/security-announce/2009/May/msg00002.html | Broken Link, Mailing List, Third Party Advisory | |
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2013-0130.html | Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/29348 | Not Applicable, Third Party Advisory | |
cve@mitre.org | http://secunia.com/advisories/35074 | Not Applicable, Third Party Advisory | |
cve@mitre.org | http://security.gentoo.org/glsa/glsa-200803-19.xml | Third Party Advisory | |
cve@mitre.org | http://securityreason.com/securityalert/3575 | Exploit, Third Party Advisory | |
cve@mitre.org | http://securitytracker.com/id?1019256 | Broken Link, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://support.apple.com/kb/HT3549 | Third Party Advisory | |
cve@mitre.org | http://www.mindedsecurity.com/MSA01150108.html | Broken Link | |
cve@mitre.org | http://www.securityfocus.com/archive/1/486847/100/0/threaded | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/bid/27409 | Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.us-cert.gov/cas/techalerts/TA09-133A.html | Third Party Advisory, US Government Resource | |
cve@mitre.org | http://www.vupen.com/english/advisories/2009/1297 | Permissions Required, Third Party Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/39893 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E | ||
cve@mitre.org | https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/May/msg00002.html | Broken Link, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2013-0130.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/29348 | Not Applicable, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35074 | Not Applicable, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200803-19.xml | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/3575 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1019256 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3549 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.mindedsecurity.com/MSA01150108.html | Broken Link | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/486847/100/0/threaded | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/27409 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/cas/techalerts/TA09-133A.html | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1297 | Permissions Required, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/39893 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E |
Vendor | Product | Version | |
---|---|---|---|
apache | http_server | * | |
redhat | enterprise_linux_desktop | 5.0 | |
redhat | enterprise_linux_server | 5.0 | |
redhat | enterprise_linux_workstation | 5.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BBBCFC4-2CFE-42A2-BE6F-2710EB3921A9", "versionEndExcluding": "2.2.12", "versionStartIncluding": "2.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) \"406 Not Acceptable\" or (2) \"300 Multiple Choices\" HTTP response when the extension is omitted in a request for the file." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n CRLF (se refiere a CR (retorno de carro) y LF (salto de l\u00ednea)) en el m\u00f3dulo mod_negotiation de Apache HTTP Server 2.2.6 y anteriores en las series 2.2.x, 2.0.61 y anteriores en las series 2.0.x, y 1.3.39 y anteriores en las series 1.3.x permite a usuarios remotos autenticados inyectar cabeceras HTTP y llevar a cabo ataques de ruptura de respuestas HTTP subiendo un fichero con un nombre multi-l\u00ednea que contiene secuencias de cabeceras HTTP y una extensi\u00f3n de fichero, lo cual conduce a la inyecci\u00f3n en respuestas HTTP (1) \"406 Not Acceptable\" o (2) \"300 Multiple Choices\" al omitir la extensi\u00f3n en una petici\u00f3n al fichero." } ], "id": "CVE-2008-0456", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-01-25T01:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0130.html" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable", "Third Party Advisory" ], "url": "http://secunia.com/advisories/29348" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable", "Third Party Advisory" ], "url": "http://secunia.com/advisories/35074" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200803-19.xml" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://securityreason.com/securityalert/3575" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1019256" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3549" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.mindedsecurity.com/MSA01150108.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/486847/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/27409" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39893" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "source": "cve@mitre.org", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0130.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable", "Third Party Advisory" ], "url": "http://secunia.com/advisories/29348" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable", "Third Party Advisory" ], "url": "http://secunia.com/advisories/35074" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200803-19.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://securityreason.com/securityalert/3575" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1019256" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3549" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://www.mindedsecurity.com/MSA01150108.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/486847/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/27409" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39893" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "We do not consider this issue to be security sensitive. Untrusted users should not be permitted to upload files to the directories from where they can be directly served by the web server without prior careful sanitation of both contents and filename.", "lastModified": "2008-01-25T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CERTA-2009-AVI-186
Vulnerability from certfr_avis
Plusieurs vulnérabilités ont été identifiées dans le système d'exploitation Apple Mac OS X. L'exploitation de certaines d'entre elles peut conduire à l'exécution de code arbitraire à distance sur le système vulnérable.
Description
Plusieurs vulnérabilités ont été identifiées dans le système d'exploitation Apple Mac OS X. Elles touchent divers composants et services installés comme CFNetworks (manipulation des échanges HTTP), CoreGraphics (manipulation de fichiers PDF), Help Viewer (manipulation de l'URI help:), QuickDraw Manager (manipulation d'images PICT), Safari (manipulation de l'URI feed:), OpenSSL, PHP, WebKit, X11, etc.
L'exploitation de certaines de ces vulnérabilités peut conduire à l'exécution de code arbitraire à distance sur le système vulnérable.
Solution
Se référer au bulletin de sécurité 2009-002 de Apple pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Apple | N/A | Mac OS X Server version 10.4.11 ainsi que celles antérieures. | ||
Apple | N/A | Mac OS X Server version 10.5.6 ainsi que celles antérieures ; | ||
Apple | N/A | Mac OS X version 10.5.6 ainsi que celles antérieures ; | ||
Apple | N/A | Mac OS X version 10.4.11 ainsi que celles antérieures ; |
Title | Publication Time | Tags | |
---|---|---|---|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Mac OS X Server version 10.4.11 ainsi que celles ant\u00e9rieures.", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Mac OS X Server version 10.5.6 ainsi que celles ant\u00e9rieures ;", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Mac OS X version 10.5.6 ainsi que celles ant\u00e9rieures ;", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Mac OS X version 10.4.11 ainsi que celles ant\u00e9rieures ;", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } } ], "affected_systems_content": null, "content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le syst\u00e8me\nd\u0027exploitation Apple Mac OS X. Elles touchent divers composants et\nservices install\u00e9s comme CFNetworks (manipulation des \u00e9changes HTTP),\nCoreGraphics (manipulation de fichiers PDF), Help Viewer (manipulation\nde l\u0027URI help:), QuickDraw Manager (manipulation d\u0027images PICT), Safari\n(manipulation de l\u0027URI feed:), OpenSSL, PHP, WebKit, X11, etc.\n\nL\u0027exploitation de certaines de ces vuln\u00e9rabilit\u00e9s peut conduire \u00e0\nl\u0027ex\u00e9cution de code arbitraire \u00e0 distance sur le syst\u00e8me vuln\u00e9rable.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 2009-002 de Apple pour l\u0027obtention\ndes correctifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2009-0160", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0160" }, { "name": "CVE-2009-0147", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0147" }, { "name": "CVE-2008-3652", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3652" }, { "name": "CVE-2009-0846", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0846" }, { "name": "CVE-2008-5557", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5557" }, { "name": "CVE-2009-0847", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0847" }, { "name": "CVE-2009-0155", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0155" }, { "name": "CVE-2008-3657", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3657" }, { "name": "CVE-2009-0153", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0153" }, { "name": "CVE-2008-1517", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1517" }, { "name": "CVE-2008-3660", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3660" }, { "name": "CVE-2008-3529", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3529" }, { "name": "CVE-2008-0456", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0456" }, { "name": "CVE-2009-0943", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0943" }, { "name": "CVE-2009-0157", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0157" }, { "name": "CVE-2008-3651", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3651" }, { "name": "CVE-2009-0010", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0010" }, { "name": "CVE-2009-0040", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0040" }, { "name": "CVE-2008-1382", "url": "https://www.cve.org/CVERecord?id=CVE-2008-1382" }, { "name": "CVE-2004-1185", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1185" }, { "name": "CVE-2009-0148", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0148" }, { "name": "CVE-2008-2371", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2371" }, { "name": "CVE-2008-3658", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3658" }, { "name": "CVE-2008-3443", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3443" }, { "name": "CVE-2008-3659", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3659" }, { "name": "CVE-2009-0025", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0025" }, { "name": "CVE-2008-3863", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3863" }, { "name": "CVE-2008-2383", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2383" }, { "name": "CVE-2008-3530", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3530" }, { "name": "CVE-2009-0149", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0149" }, { "name": "CVE-2009-0154", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0154" }, { "name": "CVE-2008-3790", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3790" }, { "name": "CVE-2009-0159", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0159" }, { "name": "CVE-2008-2829", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2829" }, { "name": "CVE-2009-0165", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0165" }, { "name": "CVE-2009-0144", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0144" }, { "name": "CVE-2009-0162", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0162" }, { "name": "CVE-2008-3655", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3655" }, { "name": "CVE-2004-1186", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1186" }, { "name": "CVE-2008-2665", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2665" }, { "name": "CVE-2009-0114", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0114" }, { "name": "CVE-2008-2666", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2666" }, { "name": "CVE-2009-0021", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0021" }, { "name": "CVE-2009-0519", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0519" }, { "name": "CVE-2009-0145", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0145" }, { "name": "CVE-2008-3656", "url": "https://www.cve.org/CVERecord?id=CVE-2008-3656" }, { "name": "CVE-2009-0146", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0146" }, { "name": "CVE-2009-0844", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0844" }, { "name": "CVE-2009-0942", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0942" }, { "name": "CVE-2009-0152", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0152" }, { "name": "CVE-2009-0156", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0156" }, { "name": "CVE-2009-0946", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0946" }, { "name": "CVE-2009-0150", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0150" }, { "name": "CVE-2008-4309", "url": "https://www.cve.org/CVERecord?id=CVE-2008-4309" }, { "name": "CVE-2007-2754", "url": "https://www.cve.org/CVERecord?id=CVE-2007-2754" }, { "name": "CVE-2009-0845", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0845" }, { "name": "CVE-2009-0944", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0944" }, { "name": "CVE-2009-0164", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0164" }, { "name": "CVE-2009-0520", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0520" }, { "name": "CVE-2008-2939", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2939" }, { "name": "CVE-2009-0161", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0161" }, { "name": "CVE-2008-0158", "url": "https://www.cve.org/CVERecord?id=CVE-2008-0158" }, { "name": "CVE-2004-1184", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1184" }, { "name": "CVE-2008-5077", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5077" }, { "name": "CVE-2006-0747", "url": "https://www.cve.org/CVERecord?id=CVE-2006-0747" }, { "name": "CVE-2009-0945", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0945" } ], "initial_release_date": "2009-05-13T00:00:00", "last_revision_date": "2009-05-13T00:00:00", "links": [ { "title": "D\u00e9tails concernant la mise \u00e0 jour de s\u00e9curit\u00e9 2009-002 du 12 mai 2009\u00a0:", "url": "http://support.apple.com/kb/HT3397" }, { "title": "Bulletin de s\u00e9curit\u00e9 Apple 61798 du 12 mai 2009 :", "url": "http://docs.info.apple.com/article.html?artnum=61798" }, { "title": "D\u00e9tails concernant la mise \u00e0 jour de s\u00e9curit\u00e9 2009-002 du 12 mai 2009\u00a0:", "url": "http://support.apple.com/kb/HT3549" } ], "reference": "CERTA-2009-AVI-186", "revisions": [ { "description": "version initiale.", "revision_date": "2009-05-13T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "Plusieurs vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 identifi\u00e9es dans le syst\u00e8me\nd\u0027exploitation Apple Mac OS X. L\u0027exploitation de certaines d\u0027entre elles\npeut conduire \u00e0 l\u0027ex\u00e9cution de code arbitraire \u00e0 distance sur le syst\u00e8me\nvuln\u00e9rable.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Mac OS X", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 2009-002 Apple du 12 mai 2009", "url": null } ] }
gsd-2008-0456
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2008-0456", "description": "CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) \"406 Not Acceptable\" or (2) \"300 Multiple Choices\" HTTP response when the extension is omitted in a request for the file.", "id": "GSD-2008-0456", "references": [ "https://www.suse.com/security/cve/CVE-2008-0456.html", "https://access.redhat.com/errata/RHSA-2013:0130", "https://linux.oracle.com/cve/CVE-2008-0456.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2008-0456" ], "details": "CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) \"406 Not Acceptable\" or (2) \"300 Multiple Choices\" HTTP response when the extension is omitted in a request for the file.", "id": "GSD-2008-0456", "modified": "2023-12-13T01:22:58.783938Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0456", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) \"406 Not Acceptable\" or (2) \"300 Multiple Choices\" HTTP response when the extension is omitted in a request for the file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20080122 Apache mod_negotiation Xss and Http Response Splitting", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/486847/100/0/threaded" }, { "name": "GLSA-200803-19", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200803-19.xml" }, { "name": "http://support.apple.com/kb/HT3549", "refsource": "CONFIRM", "url": "http://support.apple.com/kb/HT3549" }, { "name": "1019256", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1019256" }, { "name": "3575", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3575" }, { "name": "35074", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/35074" }, { "name": "APPLE-SA-2009-05-12", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "apache-modnegotiation-response-splitting(39893)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39893" }, { "name": "http://www.mindedsecurity.com/MSA01150108.html", "refsource": "MISC", "url": "http://www.mindedsecurity.com/MSA01150108.html" }, { "name": "29348", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/29348" }, { "name": "TA09-133A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "RHSA-2013:0130", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2013-0130.html" }, { "name": "ADV-2009-1297", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "27409", "refsource": "BID", "url": "http://www.securityfocus.com/bid/27409" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.2.12", "versionStartIncluding": "2.2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-0456" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "CRLF injection vulnerability in the mod_negotiation module in the Apache HTTP Server 2.2.6 and earlier in the 2.2.x series, 2.0.61 and earlier in the 2.0.x series, and 1.3.39 and earlier in the 1.3.x series allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks by uploading a file with a multi-line name containing HTTP header sequences and a file extension, which leads to injection within a (1) \"406 Not Acceptable\" or (2) \"300 Multiple Choices\" HTTP response when the extension is omitted in a request for the file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-74" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.mindedsecurity.com/MSA01150108.html", "refsource": "MISC", "tags": [ "Broken Link" ], "url": "http://www.mindedsecurity.com/MSA01150108.html" }, { "name": "27409", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/27409" }, { "name": "1019256", "refsource": "SECTRACK", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://securitytracker.com/id?1019256" }, { "name": "GLSA-200803-19", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "http://security.gentoo.org/glsa/glsa-200803-19.xml" }, { "name": "29348", "refsource": "SECUNIA", "tags": [ "Not Applicable", "Third Party Advisory" ], "url": "http://secunia.com/advisories/29348" }, { "name": "3575", "refsource": "SREASON", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://securityreason.com/securityalert/3575" }, { "name": "ADV-2009-1297", "refsource": "VUPEN", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/1297" }, { "name": "35074", "refsource": "SECUNIA", "tags": [ "Not Applicable", "Third Party Advisory" ], "url": "http://secunia.com/advisories/35074" }, { "name": "APPLE-SA-2009-05-12", "refsource": "APPLE", "tags": [ "Broken Link", "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2009/May/msg00002.html" }, { "name": "http://support.apple.com/kb/HT3549", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://support.apple.com/kb/HT3549" }, { "name": "TA09-133A", "refsource": "CERT", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-133A.html" }, { "name": "RHSA-2013:0130", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2013-0130.html" }, { "name": "apache-modnegotiation-response-splitting(39893)", "refsource": "XF", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/39893" }, { "name": "20080122 Apache mod_negotiation Xss and Http Response Splitting", "refsource": "BUGTRAQ", "tags": [ "VDB Entry", "Third Party Advisory" ], "url": "http://www.securityfocus.com/archive/1/486847/100/0/threaded" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E" }, { "name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": true } }, "lastModifiedDate": "2022-09-21T19:08Z", "publishedDate": "2008-01-25T01:00Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.