drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Cross-Site-Skripting in Apache 2
Name: |
Cross-Site-Skripting in Apache 2
|
|
ID: |
200211-003 |
|
Distribution: |
Gentoo |
|
Plattformen: |
Keine Angabe |
|
Datum: |
Fr, 15. November 2002, 12:00 |
|
Referenzen: |
Keine Angabe |
|
Applikationen: |
Apache |
|
Originalnachricht |
---------- Forwarded Message ----------
Subject: GLSA: apache Date: Tue, 12 Nov 2002 15:23:30 +0100 From: Daniel Ahlberg <aliz@gentoo.org> To: gentoo-announce@gentoo.org
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
-------------------------------------------------------------------- GENTOO LINUX SECURITY ANNOUNCEMENT 200211-003 --------------------------------------------------------------------
PACKAGE : apache SUMMARY : Cross-Site Scripting Vulnerability DATE : 2002-11-12 14:11 UTC EXPLOIT : local
--------------------------------------------------------------------
A vulnerability exists in the SSI error pages of Apache 2.0 that involves incorrect filtering of server signature data. The vulnerability could enable an attacker to hijack web sessions, allowing a range of potential compromises on the targeted host.
Read the full advisory at http://online.securityfocus.com/archive/1/293791
SOLUTION
It is recommended that all Gentoo Linux users who are running net-www/apache-2.0.42 and earlier update their systems as follows:
emerge rsync emerge apache emerge clean
-------------------------------------------------------------------- aliz@gentoo.org - GnuPG key is available at www.gentoo.org/~aliz -------------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQE90Q7hfT7nyhUpoZMRArM0AJ4htFFr3gBDW5tga3p02/CAleoK/wCeK8gc VMxVJ4+E8XG9wCy81Y1TwOA= =wYi6 -----END PGP SIGNATURE-----
-------------------------------------------------------
-- gentoo-security@gentoo.org mailing list
|
|
|
|