Mageia alert MGASA-2013-0174 (apache)
| From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
| To: | updates-announce@ml.mageia.org | |
| Subject: | [updates-announce] MGASA-2013-0174: Updated apache packages fix security vulnerabilities | |
| Date: | Wed, 19 Jun 2013 12:11:42 +0200 | |
| Message-ID: | <20130619101142.E734641653@valstar.mageia.org> |
MGASA-2013-0174 - Updated apache packages fix security vulnerabilities Publication date: 19 Jun 2013 URL: http://advisories.mageia.org/MGASA-2013-0174.html Type: security Affected Mageia releases: 2 CVE: CVE-2013-1862 Description: It was found that mod_rewrite did not filter terminal escape sequences from its log file. If mod_rewrite was configured with the RewriteLog directive, a remote attacker could use specially-crafted HTTP requests to inject terminal escape sequences into the mod_rewrite log file. If a victim viewed the log file with a terminal emulator, it could result in arbitrary command execution with the privileges of that user (CVE-2013-1862). A buffer overflow when reading digest password file with very long lines in htdigest (PR54893) References: - https://bugs.mageia.org/show_bug.cgi?id=10097 - https://issues.apache.org/bugzilla/show_bug.cgi?id=54893 - https://rhn.redhat.com/errata/RHSA-2013-0815.html - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1862 SRPMS: - 2/core/apache-2.2.24-1.1.mga2
