[prev in list] [next in list] [prev in thread] [next in thread] 

List:       secunia-sec-adv
Subject:    [SA11705] Fedora update for httpd
From:       Secunia Security Advisories <sec-adv () secunia ! com>
Date:       2004-05-26 16:08:47
Message-ID: 200405261608.i4QG8leA026135 () secunia ! com
[Download RAW message or body]


TITLE:
Fedora update for httpd

SECUNIA ADVISORY ID:
SA11705

VERIFY ADVISORY:
http://secunia.com/advisories/11705/

CRITICAL:
Less critical

IMPACT:
Manipulation of data, DoS

WHERE:
From remote

OPERATING SYSTEM:
Fedora Core 1

DESCRIPTION:
Fedora has issued an update for httpd. This fixes two
vulnerabilities, which can be exploited by malicious people to cause
a DoS (Denial of Service) or inject certain potentially malicious
characters in error log files.

For more information:
SA8146
SA11092

SOLUTION:
This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/1/

b008b66b5af9ce253a53a805919a6814 SRPMS/httpd-2.0.49-1.1.src.rpm
f047f09af00b168af1b67ce4ff377c39 i386/httpd-2.0.49-1.1.i386.rpm
52befed28d29860131a578615c2a4ff1
i386/httpd-devel-2.0.49-1.1.i386.rpm
2915df9769773493e82472ce5dfe84dc
i386/httpd-manual-2.0.49-1.1.i386.rpm
d943e6a34e9dbf1df956f9b98faf9e36 i386/mod_ssl-2.0.49-1.1.i386.rpm
7a59a2e8e05ae55d188c6eeaa2b57e3d
i386/debug/httpd-debuginfo-2.0.49-1.1.i386.rpm
89d28478a3a3fa06872aa5a5c4738d08 x86_64/httpd-2.0.49-1.1.x86_64.rpm
4b08a98a31db3e9b4b7482d63b107e18
x86_64/httpd-devel-2.0.49-1.1.x86_64.rpm
d553b52be3170277f528289ea1fc8eef
x86_64/httpd-manual-2.0.49-1.1.x86_64.rpm
b0a67133622538b4d3137114dba3ad04
x86_64/mod_ssl-2.0.49-1.1.x86_64.rpm
479c2ccc1fada2efde2ba409c9058d75
x86_64/debug/httpd-debuginfo-2.0.49-1.1.x86_64.rpm

OTHER REFERENCES:
SA8146:
http://secunia.com/advisories/8146/

SA11092:
http://secunia.com/advisories/11092/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=secunia-sec-adv@progressive-comp.com

----------------------------------------------------------------------
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic