Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in apr-util
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in apr-util
ID: MDVSA-2009:131-1
Distribution: Mandriva
Plattformen: Mandriva Corporate 3.0, Mandriva Multi Network Firewall 2.0
Datum: So, 7. Juni 2009, 01:21
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956
Applikationen: Apache Portable Runtime

Originalnachricht

This is a multi-part message in MIME format...

------------=_1244330490-27111-5169


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2009:131-1
http://www.mandriva.com/security/
_______________________________________________________________________

Package : apr-util
Date : June 6, 2009
Affected: Corporate 3.0, Multi Network Firewall 2.0
_______________________________________________________________________

Problem Description:

Multiple security vulnerabilities has been identified and fixed
in apr-util:

The apr_strmatch_precompile function in strmatch/apr_strmatch.c in
Apache APR-util before 1.3.5 allows remote attackers to cause a denial
of service (daemon crash) via crafted input involving (1) a .htaccess
file used with the Apache HTTP Server, (2) the SVNMasterURI directive
in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2
module for the Apache HTTP Server, or (4) an application that uses
the libapreq2 library, related to an underflow flaw. (CVE-2009-0023).

The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in
Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn
modules in the Apache HTTP Server, allows remote attackers to
cause a denial of service (memory consumption) via a crafted XML
document containing a large number of nested entity references, as
demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564
(CVE-2009-1955).

Off-by-one error in the apr_brigade_vprintf function in Apache APR-util
before 1.3.5 on big-endian platforms allows remote attackers to obtain
sensitive information or cause a denial of service (application crash)
via crafted input (CVE-2009-1956).

The updated packages have been patched to prevent this.

Update:

Fixed packages for CS3 and MNF2 was missing with the last update.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956
_______________________________________________________________________

Updated Packages:

Corporate 3.0:
6438073fa2571cedb2edcb8a695bda16
corporate/3.0/i586/apache2-2.0.48-6.20.C30mdk.i586.rpm
12e8afeabb65ea4abf905524fd61b343
corporate/3.0/i586/apache2-common-2.0.48-6.20.C30mdk.i586.rpm
4eadd42fb186a26d786d25362533e82a
corporate/3.0/i586/apache2-devel-2.0.48-6.20.C30mdk.i586.rpm
832d9dbd5600782a929b71bd7e6f61bb
corporate/3.0/i586/apache2-manual-2.0.48-6.20.C30mdk.i586.rpm
750c02cf0859b7b317f124c5107a5b07
corporate/3.0/i586/apache2-mod_cache-2.0.48-6.20.C30mdk.i586.rpm
9ed613802d3e5f8fc088b8465428f1d9
corporate/3.0/i586/apache2-mod_dav-2.0.48-6.20.C30mdk.i586.rpm
9030c9382a9d4d3020b8fd815cbabaa7
corporate/3.0/i586/apache2-mod_deflate-2.0.48-6.20.C30mdk.i586.rpm
8e98aa19ce3197ae31f870c84402e1ea
corporate/3.0/i586/apache2-mod_disk_cache-2.0.48-6.20.C30mdk.i586.rpm
97233182b774c4350d05e4e7422aca65
corporate/3.0/i586/apache2-mod_file_cache-2.0.48-6.20.C30mdk.i586.rpm
40e47234eb2605375c5fc717659e0eae
corporate/3.0/i586/apache2-mod_ldap-2.0.48-6.20.C30mdk.i586.rpm
80dfaf750009361fe621c594bec5efb7
corporate/3.0/i586/apache2-mod_mem_cache-2.0.48-6.20.C30mdk.i586.rpm
6573645bbb414f59115229207305a3f3
corporate/3.0/i586/apache2-mod_proxy-2.0.48-6.20.C30mdk.i586.rpm
612e933acc767970ecdf1f23e62c2ebf
corporate/3.0/i586/apache2-mod_ssl-2.0.48-6.20.C30mdk.i586.rpm
dc00610fd6633f63f891c5f768a22acd
corporate/3.0/i586/apache2-modules-2.0.48-6.20.C30mdk.i586.rpm
5241d3032ae49713e43d07d39fbbee04
corporate/3.0/i586/apache2-source-2.0.48-6.20.C30mdk.i586.rpm
34d3d434bc723130e6e59049b5e3939a
corporate/3.0/i586/libapr0-2.0.48-6.20.C30mdk.i586.rpm
f048b454b9bf609c1cc7b13c413387d4
corporate/3.0/SRPMS/apache2-2.0.48-6.20.C30mdk.src.rpm

Corporate 3.0/X86_64:
755b2e066f779fa9aad5f403335e1f75
corporate/3.0/x86_64/apache2-2.0.48-6.20.C30mdk.x86_64.rpm
42bc30427c45df83d7a0fbb5bee60505
corporate/3.0/x86_64/apache2-common-2.0.48-6.20.C30mdk.x86_64.rpm
783174aa020c5b14095087172bade395
corporate/3.0/x86_64/apache2-devel-2.0.48-6.20.C30mdk.x86_64.rpm
4b54570bdb7f6aa29d370a9250a55450
corporate/3.0/x86_64/apache2-manual-2.0.48-6.20.C30mdk.x86_64.rpm
9fb862a630cc2fdddf5aadffc73d8f03
corporate/3.0/x86_64/apache2-mod_cache-2.0.48-6.20.C30mdk.x86_64.rpm
ce00089db719cc5fccf8c5ed614e0f86
corporate/3.0/x86_64/apache2-mod_dav-2.0.48-6.20.C30mdk.x86_64.rpm
6c7ce93e4faf3910a4e37ecfb3aa6bcf
corporate/3.0/x86_64/apache2-mod_deflate-2.0.48-6.20.C30mdk.x86_64.rpm
084c2310ae92da6d58f2c2d9748ef947
corporate/3.0/x86_64/apache2-mod_disk_cache-2.0.48-6.20.C30mdk.x86_64.rpm
338bedc1f695ac29257f4fbbbae0e913
corporate/3.0/x86_64/apache2-mod_file_cache-2.0.48-6.20.C30mdk.x86_64.rpm
429fcecf3fa53ec73c1c2082a06c8a7b
corporate/3.0/x86_64/apache2-mod_ldap-2.0.48-6.20.C30mdk.x86_64.rpm
34b8969d6cdf063c24c3db5da60b66ed
corporate/3.0/x86_64/apache2-mod_mem_cache-2.0.48-6.20.C30mdk.x86_64.rpm
b4ff66b59400e60406286db040351c46
corporate/3.0/x86_64/apache2-mod_proxy-2.0.48-6.20.C30mdk.x86_64.rpm
e0fce8ab4362f1a40461af7cc1f388c0
corporate/3.0/x86_64/apache2-mod_ssl-2.0.48-6.20.C30mdk.x86_64.rpm
6da81ad00ba8f7e6f35e18a81b79ecc4
corporate/3.0/x86_64/apache2-modules-2.0.48-6.20.C30mdk.x86_64.rpm
3cef182192afb5a101aed6b824d9950a
corporate/3.0/x86_64/apache2-source-2.0.48-6.20.C30mdk.x86_64.rpm
7b3b62b6b01d77c344a66b74f6fc92c0
corporate/3.0/x86_64/lib64apr0-2.0.48-6.20.C30mdk.x86_64.rpm
f048b454b9bf609c1cc7b13c413387d4
corporate/3.0/SRPMS/apache2-2.0.48-6.20.C30mdk.src.rpm

Multi Network Firewall 2.0:
dc646d83c4a17cd5253cad5627b27baf
mnf/2.0/i586/apache2-2.0.48-6.20.C30mdk.i586.rpm
b3e5796e1c8b600153bb7760aa3c7c44
mnf/2.0/i586/apache2-common-2.0.48-6.20.C30mdk.i586.rpm
0c1b528680931b0d0d62aed029c00cc2
mnf/2.0/i586/apache2-devel-2.0.48-6.20.C30mdk.i586.rpm
3951d007d5ba03eec47465eaabfe3f23
mnf/2.0/i586/apache2-manual-2.0.48-6.20.C30mdk.i586.rpm
8e55c40e40744a064882cd0fa4ef5cf0
mnf/2.0/i586/apache2-mod_cache-2.0.48-6.20.C30mdk.i586.rpm
3f91a25523c535522cc84ff120fdc0ed
mnf/2.0/i586/apache2-mod_dav-2.0.48-6.20.C30mdk.i586.rpm
f2b9e2ce65a8b9195befd7ac0250e6c4
mnf/2.0/i586/apache2-mod_deflate-2.0.48-6.20.C30mdk.i586.rpm
6c612ca239c1e15ca44beea45802d2ca
mnf/2.0/i586/apache2-mod_disk_cache-2.0.48-6.20.C30mdk.i586.rpm
1fe18f3beae65e236fc2ebb124fac665
mnf/2.0/i586/apache2-mod_file_cache-2.0.48-6.20.C30mdk.i586.rpm
239baa6e2e43f7e4d8b68ba57d604f2c
mnf/2.0/i586/apache2-mod_ldap-2.0.48-6.20.C30mdk.i586.rpm
0b90721f4df783807ad1a10608f6bab1
mnf/2.0/i586/apache2-mod_mem_cache-2.0.48-6.20.C30mdk.i586.rpm
7f372005bb7420f976f2841f86c97397
mnf/2.0/i586/apache2-mod_proxy-2.0.48-6.20.C30mdk.i586.rpm
41edbf29d8d04a4eb449b3c7970ac106
mnf/2.0/i586/apache2-mod_ssl-2.0.48-6.20.C30mdk.i586.rpm
0173e0d347b2f8371cb2ebd8224e9953
mnf/2.0/i586/apache2-modules-2.0.48-6.20.C30mdk.i586.rpm
2ce003b3977c10d3e88b2d6c1dad3f9b
mnf/2.0/i586/apache2-source-2.0.48-6.20.C30mdk.i586.rpm
f4e5264b902bfb715cb473971f15919b
mnf/2.0/i586/libapr0-2.0.48-6.20.C30mdk.i586.rpm
8378e9f5191f581f69e6035c384a18d9
mnf/2.0/SRPMS/apache2-2.0.48-6.20.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFKKs7EmqjQ0CJFipgRAvW1AKDFncWXD3WDxWdnZ15jHvdjXjvsjwCfYM/c
qWtinAYlUKkAjD1lrgm+KdM=
=o+c7
-----END PGP SIGNATURE-----


------------=_1244330490-27111-5169
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1244330490-27111-5169--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung