SUSE SLES10 Security Update : apache2 (SUSE-SU-2013:0469-1)

medium Nessus Plugin ID 83578

Synopsis

The remote SUSE host is missing one or more security updates.

Description

This Apache2 LTSS roll-up update for SUSE Linux Enterprise 10 SP3 LTSS fixes the following security issues and bugs :

- CVE-2012-4557: Denial of Service via special requests in mod_proxy_ajp

- CVE-2012-0883: improper LD_LIBRARY_PATH handling

- CVE-2012-2687: filename escaping problem

- CVE-2012-0031: Fixed a scoreboard corruption (shared mem segment) by child causes crash of privileged parent (invalid free()) during shutdown.

- CVE-2012-0053: Fixed an issue in error responses that could expose 'httpOnly' cookies when no custom ErrorDocument is specified for status code 400'.

- The SSL configuration template has been adjusted not to suggested weak ciphers CVE-2007-6750: The 'mod_reqtimeout' module was backported from Apache 2.2.21 to help mitigate the 'Slowloris' Denial of Service attack.

You need to enable the 'mod_reqtimeout' module in your existing apache configuration to make it effective, e.g.
in the APACHE_MODULES line in /etc/sysconfig/apache2.

- CVE-2011-3639, CVE-2011-3368, CVE-2011-4317: This update also includes several fixes for a mod_proxy reverse exposure via RewriteRule or ProxyPassMatch directives.

- CVE-2011-1473: Fixed the SSL renegotiation DoS by disabling renegotiation by default.

- CVE-2011-3607: Integer overflow in ap_pregsub function resulting in a heap-based buffer overflow could potentially allow local attackers to gain privileges

Additionally, some non-security bugs have been fixed which are listed in the changelog file.

Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected apache2 packages

See Also

http://www.nessus.org/u?216a63aa

http://support.novell.com/security/cve/CVE-2012-0021.html

http://support.novell.com/security/cve/CVE-2012-0883.html

http://support.novell.com/security/cve/CVE-2012-2687.html

http://support.novell.com/security/cve/CVE-2012-4557.html

https://bugzilla.novell.com/688472

https://bugzilla.novell.com/719236

https://bugzilla.novell.com/722545

https://bugzilla.novell.com/727071

https://bugzilla.novell.com/727993

https://bugzilla.novell.com/729181

https://bugzilla.novell.com/736706

https://bugzilla.novell.com/738855

https://bugzilla.novell.com/741243

https://bugzilla.novell.com/743743

https://bugzilla.novell.com/757710

https://bugzilla.novell.com/777260

http://www.nessus.org/u?64e1fdd5

Plugin Details

Severity: Medium

ID: 83578

File Name: suse_SU-2013-0469-1.nasl

Version: 2.8

Type: local

Agent: unix

Published: 5/20/2015

Updated: 1/19/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.6

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Temporal Score: 5.4

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:apache2-devel, p-cpe:/a:novell:suse_linux:apache2-prefork, p-cpe:/a:novell:suse_linux:apache2, p-cpe:/a:novell:suse_linux:apache2-doc, cpe:/o:novell:suse_linux:10, p-cpe:/a:novell:suse_linux:apache2-worker, p-cpe:/a:novell:suse_linux:apache2-example-pages

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/15/2013

Exploitable With

ExploitHub (EH-14-410)

Reference Information

CVE: CVE-2007-6750, CVE-2011-1473, CVE-2011-3368, CVE-2011-3607, CVE-2011-3639, CVE-2011-4317, CVE-2012-0021, CVE-2012-0031, CVE-2012-0053, CVE-2012-0883, CVE-2012-2687, CVE-2012-4557

BID: 21865, 48626, 49957, 50494, 50802, 51705, 51869, 53046, 55131, 56753