USN-1368-1: Apache HTTP Server vulnerabilities
16 February 2012
Several security issues were fixed in the Apache HTTP Server.
Releases
Packages
- apache2 - Apache HTTP server
Details
It was discovered that the Apache HTTP Server incorrectly handled the
SetEnvIf .htaccess file directive. An attacker having write access to a
.htaccess file may exploit this to possibly execute arbitrary code.
(CVE-2011-3607)
Prutha Parikh discovered that the mod_proxy module did not properly
interact with the RewriteRule and ProxyPassMatch pattern matches in the
configuration of a reverse proxy. This could allow remote attackers to
contact internal webservers behind the proxy that were not intended for
external exposure. (CVE-2011-4317)
Rainer Canavan discovered that the mod_log_config module incorrectly
handled a certain format string when used with a threaded MPM. A remote
attacker could exploit this to cause a denial of service via a specially-
crafted cookie. This issue only affected Ubuntu 11.04 and 11.10.
(CVE-2012-0021)
It was discovered that the Apache HTTP Server incorrectly handled certain
type fields within a scoreboard shared memory segment. A local attacker
could exploit this to to cause a denial of service. (CVE-2012-0031)
Norman Hippert discovered that the Apache HTTP Server incorrecly handled
header information when returning a Bad Request (400) error page. A remote
attacker could exploit this to obtain the values of certain HTTPOnly
cookies. (CVE-2012-0053)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 8.04
Ubuntu 11.10
Ubuntu 11.04
Ubuntu 10.10
Ubuntu 10.04
In general, a standard system update will make all the necessary changes.