Welcome to Gaia! ::

The Official Linux Users of Gaia

Back to Guilds

A Guild for Linux, BSD, Mac, Solaris, and other Unix like operating systems. 

Tags: Computer Help, Linux, BSD (Berkeley Software Distrobution), Mac (Macintosh), Unix 

Reply Linux Security, keeping you on top of the bugs!
Pardus 06/14/09 (x2)

Quick Reply

Enter both words below, separated by a space:

Can't read the text? Click here

Submit

vendion Gear
Captain

PostPosted: Sun Jun 14, 2009 10:48 am


A security issue has been reported in Apache HTTP Server, which can be exploited by malicious, local users to bypass certain security restrictions.


------------------------------------------------------------------------
Pardus Linux Security Advisory 2009-88 security@pardus.org.tr
------------------------------------------------------------------------
Date: 2009-06-13
Severity: 2
Type: Local
------------------------------------------------------------------------

Summary
=======

A security issue has been reported in Apache HTTP Server, which can be
exploited by malicious, local users to bypass certain security
restrictions.


Description
===========

The security issue is caused due to an error when processing
"AllowOverride" directives and certain "Options" arguments in
".htaccess" files, which can be exploited to e.g. execute commands via
Server Side Includes.



Affected packages:

Pardus 2008:
apache, all before 2.2.11-29-8


Resolution
==========

There are update(s) for apache. You can update them via Package Manager
or with a single command from console:

pisi up apache

References
==========

* http://bugs.pardus.org.tr/show_bug.cgi?id=9843
* http://svn.apache.org/viewvc?view=rev&revision=772997
* http://secunia.com/advisories/35261/2/
PostPosted: Sun Jun 14, 2009 10:50 am


Some vulnerabilities have been reported in APR-util, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service).


------------------------------------------------------------------------
Pardus Linux Security Advisory 2009-89 security@pardus.org.tr
------------------------------------------------------------------------
Date: 2009-06-13
Severity: 2
Type: Remote
------------------------------------------------------------------------

Summary
=======

Some vulnerabilities have been reported in APR-util, which can be
exploited by malicious users and malicious people to cause a DoS (Denial
of Service).


Description
===========

1) A vulnerability is caused due to an error in the processing of XML
files and can be exploited to exhaust all available memory via a
specially crafted XML file containing a predefined entity inside an
entity definition.

2) A vulnerability is caused due to an error within the
"apr_strmatch_precompile()" function in strmatch/apr_strmatch.c, which
can be exploited to crash an application using the library.

3) Off-by-one error in the apr_brigade_vprintf function on big-endian
platforms allows remote attackers to obtain sensitive information or
cause a denial of service (application crash) via crafted input.



Affected packages:

Pardus 2008:
apr-util, all before 1.2.12-7-3


Resolution
==========

There are update(s) for apr-util. You can update them via Package
Manager or with a single command from console:

pisi up apr-util

References
==========

* http://bugs.pardus.org.tr/show_bug.cgi?id=9980
* http://bugs.pardus.org.tr/show_bug.cgi?id=9981
* http://bugs.pardus.org.tr/show_bug.cgi?id=9982
* http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3
* http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0023
* http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1955
* http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1956
* http://secunia.com/advisories/35284

vendion Gear
Captain

Reply
Linux Security, keeping you on top of the bugs!

 
Manage Your Items
Other Stuff
Get GCash
Offers
Get Items
More Items
Where Everyone Hangs Out
Other Community Areas
Virtual Spaces
Fun Stuff
Gaia's Games
Mini-Games
Play with GCash
Play with Platinum