First published: Thu Mar 25 2010(Updated: )
The Apache HTTP Server is a popular web server.<br>It was discovered that mod_proxy_ajp incorrectly returned an "Internal<br>Server Error" response when processing certain malformed requests, which<br>caused the back-end server to be marked as failed in configurations where<br>mod_proxy is used in load balancer mode. A remote attacker could cause<br>mod_proxy to not send requests to back-end AJP (Apache JServ Protocol)<br>servers for the retry timeout period (60 seconds by default) by sending<br>specially-crafted requests. (CVE-2010-0408)<br>A use-after-free flaw was discovered in the way the Apache HTTP Server<br>handled request headers in subrequests. In configurations where subrequests<br>are used, a multithreaded MPM (Multi-Processing Module) could possibly leak<br>information from other requests in request replies. (CVE-2010-0434)<br>This update also adds the following enhancement:<br><li> with the updated openssl packages from RHSA-2010:0162 installed, mod_ssl</li> will refuse to renegotiate a TLS/SSL connection with an unpatched client<br>that does not support RFC 5746. This update adds the<br>"SSLInsecureRenegotiation" configuration directive. If this directive is<br>enabled, mod_ssl will renegotiate insecurely with unpatched clients.<br>(BZ#567980)<br>Refer to the following Red Hat Knowledgebase article for more details about<br>the changed mod_ssl behavior: <a href="http://kbase.redhat.com/faq/docs/DOC-20491" target="_blank">http://kbase.redhat.com/faq/docs/DOC-20491</a> All httpd users should upgrade to these updated packages, which contain<br>backported patches to correct these issues and add this enhancement. After<br>installing the updated packages, the httpd daemon must be restarted for the<br>update to take effect.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.2.3-31.el5_4.4 | 2.2.3-31.el5_4.4 |
redhat/httpd | <2.2.3-31.el5_4.4 | 2.2.3-31.el5_4.4 |
redhat/httpd-devel | <2.2.3-31.el5_4.4 | 2.2.3-31.el5_4.4 |
redhat/httpd-devel | <2.2.3-31.el5_4.4 | 2.2.3-31.el5_4.4 |
redhat/httpd-manual | <2.2.3-31.el5_4.4 | 2.2.3-31.el5_4.4 |
redhat/httpd-manual | <2.2.3-31.el5_4.4 | 2.2.3-31.el5_4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2010:0168 is considered moderate, as it can cause an internal server error during the processing of malformed requests.
To fix RHSA-2010:0168, update the Apache HTTP Server package to the version 2.2.3-31.el5_4.4 or later.
The vulnerable versions of Apache HTTP Server are those prior to 2.2.3-31.el5_4.4.
RHSA-2010:0168 impacts the httpd, httpd-devel, and httpd-manual packages.
There are no documented workarounds for RHSA-2010:0168, so updating to the fixed version is recommended.