First published: Wed Jan 06 2010(Updated: )
The Apache HTTP Server is a popular Web server.<br>A flaw was found in the way the TLS/SSL (Transport Layer Security/Secure<br>Sockets Layer) protocols handle session renegotiation. A man-in-the-middle<br>attacker could use this flaw to prefix arbitrary plain text to a client's<br>session (for example, an HTTPS connection to a website). This could force<br>the server to process an attacker's request as if authenticated using the<br>victim's credentials. This update partially mitigates this flaw for SSL<br>sessions to HTTP servers using mod_ssl by rejecting client-requested<br>renegotiation. (CVE-2009-3555)<br>Note: This update does not fully resolve the issue for HTTPS servers. An<br>attack is still possible in configurations that require a server-initiated<br>renegotiation. Refer to the following Knowledgebase article for further<br>information: <a href="http://kbase.redhat.com/faq/docs/DOC-20491" target="_blank">http://kbase.redhat.com/faq/docs/DOC-20491</a> A NULL pointer dereference flaw was found in the Apache mod_proxy_ftp<br>module. A malicious FTP server to which requests are being proxied could<br>use this flaw to crash an httpd child process via a malformed reply to the<br>EPSV or PASV commands, resulting in a limited denial of service.<br>(CVE-2009-3094)<br>A second flaw was found in the Apache mod_proxy_ftp module. In a reverse<br>proxy configuration, a remote attacker could use this flaw to bypass<br>intended access restrictions by creating a carefully-crafted HTTP<br>Authorization header, allowing the attacker to send arbitrary commands to<br>the FTP server. (CVE-2009-3095)<br>All users of JBoss Enterprise Web Server 1.0.0 should upgrade to these<br>updated packages, which contain backported patches to correct these issues.<br>After installing the updated packages, Red Hat Enterprise Linux 4 users<br>must restart the httpd22 service, and Red Hat Enterprise Linux 5 users must<br>restart the httpd service, for the update to take effect.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.2.10-11.ep5.el5 | 2.2.10-11.ep5.el5 |
redhat/httpd | <2.2.10-11.ep5.el5 | 2.2.10-11.ep5.el5 |
redhat/httpd-devel | <2.2.10-11.ep5.el5 | 2.2.10-11.ep5.el5 |
redhat/httpd-manual | <2.2.10-11.ep5.el5 | 2.2.10-11.ep5.el5 |
redhat/httpd-devel | <2.2.10-11.ep5.el5 | 2.2.10-11.ep5.el5 |
redhat/httpd-manual | <2.2.10-11.ep5.el5 | 2.2.10-11.ep5.el5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2010:0011 is classified as moderate.
To fix RHSA-2010:0011, update the affected httpd packages to version 2.2.10-11.ep5.el5.
The impact of RHSA-2010:0011 is that a man-in-the-middle attacker could inject arbitrary plain text into a client's session.
RHSA-2010:0011 affects versions of the httpd package prior to 2.2.10-11.ep5.el5.
There is no specific workaround for RHSA-2010:0011; applying the recommended update is the best course of action.