Skip to navigation

Security Advisory apache security update

Advisory: RHSA-2006:0158-4
Type: Security Advisory
Severity: Moderate
Issued on: 2006-01-17
Last updated on: 2006-01-17
Affected Products: Red Hat Enterprise Linux AS (v. 2.1)
Red Hat Enterprise Linux ES (v. 2.1)
Red Hat Enterprise Linux WS (v. 2.1)
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor
CVEs (cve.mitre.org): CVE-2005-3352

Details

Updated Apache httpd packages that correct a security issue are now
available for Red Hat Enterprise Linux 2.1.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

The Apache HTTP Server is a popular and freely-available Web server.

A flaw in mod_imap when using the Referer directive with image maps was
discovered. With certain site configurations, a remote attacker could
perform a cross-site scripting attack if a victim can be forced to visit a
malicious URL using certain web browsers. The Common Vulnerabilities and
Exposures project assigned the name CVE-2005-3352 to this issue.

Users of apache should upgrade to these updated packages, which contain
a backported patch to correct this issue.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Red Hat Enterprise Linux AS (v. 2.1)

IA-32:
apache-1.3.27-10.ent.i386.rpm
File outdated by:  RHSA-2008:0004
    MD5: 3f093f3aec1ddeefb69276829fd52530
apache-devel-1.3.27-10.ent.i386.rpm
File outdated by:  RHSA-2008:0004
    MD5: 6965c57abb94dad2ad439b78361aca89
apache-manual-1.3.27-10.ent.i386.rpm
File outdated by:  RHSA-2008:0004
    MD5: 68a09b64153ea9510cb498fd33a2fa8f
 
IA-64:
apache-1.3.27-10.ent.ia64.rpm
File outdated by:  RHSA-2008:0004
    MD5: 16e66a9a4bf882b54fe32ab80659bc9f
apache-devel-1.3.27-10.ent.ia64.rpm
File outdated by:  RHSA-2008:0004
    MD5: 7c619644a238b62029af87f929d6b43d
apache-manual-1.3.27-10.ent.ia64.rpm
File outdated by:  RHSA-2008:0004
    MD5: 08d3b98de29abe2af59f94312dc96a74
 
Red Hat Enterprise Linux ES (v. 2.1)

IA-32:
apache-1.3.27-10.ent.i386.rpm
File outdated by:  RHSA-2008:0004
    MD5: 3f093f3aec1ddeefb69276829fd52530
apache-devel-1.3.27-10.ent.i386.rpm
File outdated by:  RHSA-2008:0004
    MD5: 6965c57abb94dad2ad439b78361aca89
apache-manual-1.3.27-10.ent.i386.rpm
File outdated by:  RHSA-2008:0004
    MD5: 68a09b64153ea9510cb498fd33a2fa8f
 
Red Hat Enterprise Linux WS (v. 2.1)

IA-32:
apache-1.3.27-10.ent.i386.rpm
File outdated by:  RHSA-2008:0004
    MD5: 3f093f3aec1ddeefb69276829fd52530
apache-devel-1.3.27-10.ent.i386.rpm
File outdated by:  RHSA-2008:0004
    MD5: 6965c57abb94dad2ad439b78361aca89
apache-manual-1.3.27-10.ent.i386.rpm
File outdated by:  RHSA-2008:0004
    MD5: 68a09b64153ea9510cb498fd33a2fa8f
 
Red Hat Linux Advanced Workstation 2.1 for the Itanium Processor

IA-64:
apache-1.3.27-10.ent.ia64.rpm
File outdated by:  RHSA-2008:0004
    MD5: 16e66a9a4bf882b54fe32ab80659bc9f
apache-devel-1.3.27-10.ent.ia64.rpm
File outdated by:  RHSA-2008:0004
    MD5: 7c619644a238b62029af87f929d6b43d
apache-manual-1.3.27-10.ent.ia64.rpm
File outdated by:  RHSA-2008:0004
    MD5: 08d3b98de29abe2af59f94312dc96a74
 

Bugs fixed (see bugzilla for more information)

175714 - CVE-2005-3352 cross-site scripting flaw in mod_imap


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/