CERTA-2010-AVI-112
Vulnerability from certfr_avis

Des vulnérabilités multiples dans les versions du serveur Apache de la branche 2.2.0, antérieures à la version 2.2.15 permettent à un utilisateur malveillant d'exécuter du code à distance, ou de provoquer un déni de service.

Description

Plusieurs vulnérabilités dans les modules mod_isapi, mod_headers et mod_proxy_ajp permettent à un utilisateur malveillant de provoquer un déni de service ou d'exécuter du code à distance.

Solution

Installer la version 2.2.15 d'Apache HTTP serveur. La version 2.2.15 intégre la version à jour de la librairie OpenSSL 0.9.8m et corrige ainsi la vulnérabilité CVE-2009-3555.

Version du serveur HTTP Apache 2.2.0 à 2.2.14.

Impacted products
Vendor Product Description

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eVersion du serveur HTTP \u003cTT\u003eApache\u003c/TT\u003e  2.2.0 \u00e0 2.2.14.\u003c/p\u003e",
  "content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s dans les modules mod_isapi, mod_headers et\nmod_proxy_ajp permettent \u00e0 un utilisateur malveillant de provoquer un\nd\u00e9ni de service ou d\u0027ex\u00e9cuter du code \u00e0 distance.\n\n## Solution\n\nInstaller la version 2.2.15 d\u0027Apache HTTP serveur. La version 2.2.15\nint\u00e9gre la version \u00e0 jour de la librairie OpenSSL 0.9.8m et corrige\nainsi la vuln\u00e9rabilit\u00e9 CVE-2009-3555.\n",
  "cves": [
    {
      "name": "CVE-2010-0434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0434"
    },
    {
      "name": "CVE-2010-0425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0425"
    },
    {
      "name": "CVE-2009-3555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
    },
    {
      "name": "CVE-2010-0408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2010-0408"
    }
  ],
  "initial_release_date": "2010-03-08T00:00:00",
  "last_revision_date": "2010-03-26T00:00:00",
  "links": [
    {
      "title": "Vuln\u00e9rabilit\u00e9s du serveur HTTP APACHE 2.2 :",
      "url": "http://httpd.apache.org/security/vulnerabilities_22.html"
    },
    {
      "title": "Annonce de la version 2.2.15 du serveur APACHE :",
      "url": "http://www.apache.org/dist/httpd/Announcement2.2.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2010:0168-1 du 25 mars    2010 :",
      "url": "http://rhn.redhat.com/errata/RHSA-2010-0168.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-908-1 du 10 mars 2010 :",
      "url": "http://www.ubuntu.com/usn/USN-908-1"
    }
  ],
  "reference": "CERTA-2010-AVI-112",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2010-03-08T00:00:00.000000"
    },
    {
      "description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 RedHat et Ubuntu.",
      "revision_date": "2010-03-26T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Des vuln\u00e9rabilit\u00e9s multiples dans les versions du serveur Apache de la\nbranche 2.2.0, ant\u00e9rieures \u00e0 la version 2.2.15 permettent \u00e0 un\nutilisateur malveillant d\u0027ex\u00e9cuter du code \u00e0 distance, ou de provoquer\nun d\u00e9ni de service.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s du serveur HTTP Apache",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Mise en ligne de la version 2.2.15 du serveur HTTP Apache",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…