You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by bu...@apache.org on 2014/09/03 16:27:06 UTC

svn commit: r921144 - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_24.html

Author: buildbot
Date: Wed Sep  3 14:27:06 2014
New Revision: 921144

Log:
Staging update by buildbot for httpd

Modified:
    websites/staging/httpd/trunk/content/   (props changed)
    websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
    websites/staging/httpd/trunk/content/security/vulnerabilities_24.html

Propchange: websites/staging/httpd/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Wed Sep  3 14:27:06 2014
@@ -1 +1 @@
-1622209
+1622269

Modified: websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml Wed Sep  3 14:27:06 2014
@@ -1,6 +1,6 @@
 <security updated="20140903">
 
-<issue fixed="2.4.11-dev" reported="20130906" public="20131019" released="20140903">
+<issue fixed="2.4.11-dev" reported="20130906" public="20131019">
 <cve name="CVE-2013-5704"/>
 <severity level="4">low</severity>
 <title>HTTP Trailers processing bypass</title>
@@ -170,7 +170,6 @@ This issue was reported by Jeff Trawick 
 <affects prod="httpd" version="2.4.1"/>
 </issue>
 
-
 <issue fixed="2.4.10" reported="20140219" public="20140714" released="20140714">
 <cve name="CVE-2014-0118"/>
 <severity level="3">moderate</severity>
@@ -237,7 +236,7 @@ This issue was reported by Giancarlo Pel
 <affects prod="httpd" version="2.2.0"/>
 </issue>
 
-<issue fixed="2.2.29" reported="20140530" public="20140714" released="20140903">
+<issue fixed="2.4.10" reported="20140530" public="20140714" released="20140714">
 <cve name="CVE-2014-0226"/>
 <severity level="3">moderate</severity>
 <title>mod_status buffer overflow</title>
@@ -262,6 +261,49 @@ This issue was reported by Marek Kroemek
 <affects prod="httpd" version="2.4.1"/>
 </issue>
 
+<issue fixed="2.2.29" reported="20140530" public="20140714" released="20140903">
+<cve name="CVE-2014-0226"/>
+<severity level="3">moderate</severity>
+<title>mod_status buffer overflow</title>
+<description><p>
+A race condition was found in mod_status.  An attacker able to access
+a public server status page on a server using a threaded MPM could send a
+carefully crafted request which could lead to a heap buffer overflow.  Note
+that it is not a default or recommended configuration to have a public
+accessible server status page.
+</p></description>
+<acknowledgements>
+This issue was reported by Marek Kroemeke, AKAT-1 and
+22733db72ab3ed94b5f8a1ffcde850251fe6f466 via HP ZDI
+</acknowledgements>
+<affects prod="httpd" version="2.2.27"/>
+<affects prod="httpd" version="2.2.26"/>
+<affects prod="httpd" version="2.2.25"/>
+<affects prod="httpd" version="2.2.24"/>
+<affects prod="httpd" version="2.2.23"/>
+<affects prod="httpd" version="2.2.22"/>
+<affects prod="httpd" version="2.2.21"/>
+<affects prod="httpd" version="2.2.20"/>
+<affects prod="httpd" version="2.2.19"/>
+<affects prod="httpd" version="2.2.18"/>
+<affects prod="httpd" version="2.2.17"/>
+<affects prod="httpd" version="2.2.16"/>
+<affects prod="httpd" version="2.2.15"/>
+<affects prod="httpd" version="2.2.14"/>
+<affects prod="httpd" version="2.2.13"/>
+<affects prod="httpd" version="2.2.12"/>
+<affects prod="httpd" version="2.2.11"/>
+<affects prod="httpd" version="2.2.10"/>
+<affects prod="httpd" version="2.2.9"/>
+<affects prod="httpd" version="2.2.8"/>
+<affects prod="httpd" version="2.2.6"/>
+<affects prod="httpd" version="2.2.5"/>
+<affects prod="httpd" version="2.2.4"/>
+<affects prod="httpd" version="2.2.3"/>
+<affects prod="httpd" version="2.2.2"/>
+<affects prod="httpd" version="2.2.0"/>
+</issue>
+
 <issue fixed="2.4.7" reported="20130914" public="20140714" released="20131126">
 <cve name="CVE-2013-4352"/>
 <severity level="4">low</severity>

Modified: websites/staging/httpd/trunk/content/security/vulnerabilities_24.html
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities_24.html (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities_24.html Wed Sep  3 14:27:06 2014
@@ -106,8 +106,7 @@ This issue was reported by Martin Holst 
   <dd>
   Reported to security team: 6th September 2013<br/>
   Issue public: 19th October 2013<br/></dd>
-  <dd>
-  Update Released: 3rd September 2014<br/></dd>
+  <dd/>
   <dd>
       Affects: 
     2.4.10, 2.4.9, 2.4.8, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1<p/></dd>
@@ -217,6 +216,34 @@ This issue was reported by Giancarlo Pel
   <dd>
       Affects: 
     2.4.9, 2.4.8, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1<p/></dd>
+  <dd>
+    <b>moderate: </b>
+    <b>
+      <name name="CVE-2014-0226">mod_status buffer overflow</name>
+    </b>
+    <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226">CVE-2014-0226</a>
+    <p>
+A race condition was found in mod_status.  An attacker able to access
+a public server status page on a server using a threaded MPM could send a
+carefully crafted request which could lead to a heap buffer overflow.  Note
+that it is not a default or recommended configuration to have a public
+accessible server status page.
+</p>
+  </dd>
+  <dd>
+    <p>Acknowledgements: 
+This issue was reported by Marek Kroemeke, AKAT-1 and
+22733db72ab3ed94b5f8a1ffcde850251fe6f466 via HP ZDI
+</p>
+  </dd>
+  <dd>
+  Reported to security team: 30th May 2014<br/>
+  Issue public: 14th July 2014<br/></dd>
+  <dd>
+  Update Released: 14th July 2014<br/></dd>
+  <dd>
+      Affects: 
+    2.4.9, 2.4.8, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1<p/></dd>
 </dl><h1 id="2.4.7">
 Fixed in Apache httpd 2.4.7</h1><dl>
   <dd>