Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2015-1667

Опубликовано: 24 авг. 2015
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2015-1667: httpd security update (MODERATE)

[2.4.6-31.0.1.el7_1.1]

  • replace index.html with Oracle's index page oracle_index.html

[2.4.6-31.1]

  • core: fix chunk header parsing defect (CVE-2015-3183)
  • core: replace of ap_some_auth_required with ap_some_authn_required and ap_force_authn hook (CVE-2015-3185)

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

httpd

2.4.6-31.0.1.el7_1.1

httpd-devel

2.4.6-31.0.1.el7_1.1

httpd-manual

2.4.6-31.0.1.el7_1.1

httpd-tools

2.4.6-31.0.1.el7_1.1

mod_ldap

2.4.6-31.0.1.el7_1.1

mod_proxy_html

2.4.6-31.0.1.el7_1.1

mod_session

2.4.6-31.0.1.el7_1.1

mod_ssl

2.4.6-31.0.1.el7_1.1

Связанные CVE

Связанные уязвимости

suse-cvrf
почти 10 лет назад

Security update for apache2

oracle-oval
больше 9 лет назад

ELSA-2015-1666: httpd24-httpd security update (MODERATE)

ubuntu
около 10 лет назад

The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.

CVSS3: 3.7
redhat
около 10 лет назад

The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.

nvd
около 10 лет назад

The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.