You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by bu...@apache.org on 2014/07/15 13:45:52 UTC

svn commit: r916278 - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_24.html

Author: buildbot
Date: Tue Jul 15 11:45:51 2014
New Revision: 916278

Log:
Staging update by buildbot for httpd

Modified:
    websites/staging/httpd/trunk/content/   (props changed)
    websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
    websites/staging/httpd/trunk/content/security/vulnerabilities_24.html

Propchange: websites/staging/httpd/trunk/content/
------------------------------------------------------------------------------
--- cms:source-revision (original)
+++ cms:source-revision Tue Jul 15 11:45:51 2014
@@ -1 +1 @@
-1610541
+1610663

Modified: websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities-httpd.xml Tue Jul 15 11:45:51 2014
@@ -1,5 +1,29 @@
 <security updated="20140714">
 
+<issue fixed="2.4.10-dev" reported="20140701" public="20140715" released="20140715">
+<cve name="CVE-2014-3523"/>
+<severity level="2">important</severity>
+<title>WinNT MPM denial of service</title>
+<description><p>
+A flaw was found in the WinNT MPM in httpd versions 2.4.1 to 2.4.9, when
+using the default AcceptFilter for that platform.  A remote attacker
+could send carefully crafted requests that would leak memory and
+eventually lead to a denial of service against the server.
+</p></description>
+<acknowledgements>
+This issue was reported by Jeff Trawick of the ASF
+</acknowledgements>
+<affects prod="httpd" version="2.4.9"/>
+<affects prod="httpd" version="2.4.8"/>
+<affects prod="httpd" version="2.4.7"/>
+<affects prod="httpd" version="2.4.6"/>
+<affects prod="httpd" version="2.4.4"/>
+<affects prod="httpd" version="2.4.3"/>
+<affects prod="httpd" version="2.4.2"/>
+<affects prod="httpd" version="2.4.1"/>
+</issue>
+
+
 <issue fixed="2.4.10-dev" reported="20140219" public="20140714" released="20140714">
 <cve name="CVE-2014-0118"/>
 <severity level="3">moderate</severity>

Modified: websites/staging/httpd/trunk/content/security/vulnerabilities_24.html
==============================================================================
--- websites/staging/httpd/trunk/content/security/vulnerabilities_24.html (original)
+++ websites/staging/httpd/trunk/content/security/vulnerabilities_24.html Tue Jul 15 11:45:51 2014
@@ -86,6 +86,32 @@ these vulnerabilities to the <a href="/s
 Team</a>.  </p><p><em>The initial GA release, Apache httpd 2.4.1, includes fixes for all vulnerabilities which have been resolved in Apache httpd 2.2.22 and all older releases.  Consult the <a href="vulnerabilities_22.html">Apache httpd 2.2 vulnerabilities list</a> for more information.</em></p><h1 id="2.4.10-dev">
 Fixed in Apache httpd 2.4.10-dev</h1><dl>
   <dd>
+    <b>important: </b>
+    <b>
+      <name name="CVE-2014-3523">WinNT MPM denial of service</name>
+    </b>
+    <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3523">CVE-2014-3523</a>
+    <p>
+A flaw was found in the WinNT MPM in httpd versions 2.4.1 to 2.4.9, when
+using the default AcceptFilter for that platform.  A remote attacker
+could send carefully crafted requests that would leak memory and
+eventually lead to a denial of service against the server.
+</p>
+  </dd>
+  <dd>
+    <p>Acknowledgements: 
+This issue was reported by Jeff Trawick of the ASF
+</p>
+  </dd>
+  <dd>
+  Reported to security team: 1st July 2014<br/>
+  Issue public: 15th July 2014<br/></dd>
+  <dd>
+  Update Released: 15th July 2014<br/></dd>
+  <dd>
+      Affects: 
+    2.4.9, 2.4.8, 2.4.7, 2.4.6, 2.4.4, 2.4.3, 2.4.2, 2.4.1<p/></dd>
+  <dd>
     <b>moderate: </b>
     <b>
       <name name="CVE-2014-0118">mod_deflate denial of service</name>