Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-0921

Опубликовано: 23 июл. 2014
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2014-0921: httpd security update (IMPORTANT)

[2.4.6-18.0.1.el7_0]

  • replace index.html with Oracle's index page oracle_index.html

[2.4.6-18]

  • mod_cgid: add security fix for CVE-2014-0231 (#1120607)
  • mod_proxy: add security fix for CVE-2014-0117 (#1120607)
  • mod_deflate: add security fix for CVE-2014-0118 (#1120607)
  • mod_status: add security fix for CVE-2014-0226 (#1120607)
  • mod_cache: add secutiry fix for CVE-2013-4352 (#1120607)

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

httpd

2.4.6-18.0.1.el7_0

httpd-devel

2.4.6-18.0.1.el7_0

httpd-manual

2.4.6-18.0.1.el7_0

httpd-tools

2.4.6-18.0.1.el7_0

mod_ldap

2.4.6-18.0.1.el7_0

mod_proxy_html

2.4.6-18.0.1.el7_0

mod_session

2.4.6-18.0.1.el7_0

mod_ssl

2.4.6-18.0.1.el7_0

Связанные уязвимости

oracle-oval
около 11 лет назад

ELSA-2014-0920: httpd security update (IMPORTANT)

ubuntu
около 11 лет назад

Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.

redhat
около 11 лет назад

Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.

nvd
около 11 лет назад

Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.

debian
около 11 лет назад

Race condition in the mod_status module in the Apache HTTP Server befo ...