You are here
Home > Preporuke > Ranjivost programskog paketa httpd

Ranjivost programskog paketa httpd

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3038-1
July 18, 2016

apache2 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 16.04 LTS
– Ubuntu 15.10
– Ubuntu 14.04 LTS
– Ubuntu 12.04 LTS

Summary:

A security issue was fixed in the Apache HTTP Server.

Software Description:
– apache2: Apache HTTP server

Details:

It was discovered that the Apache HTTP Server would set the HTTP_PROXY
environment variable based on the contents of the Proxy header from HTTP
requests. A remote attacker could possibly use this issue in combination
with CGI scripts that honour the HTTP_PROXY variable to redirect outgoing
HTTP requests.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
apache2-bin 2.4.18-2ubuntu3.1

Ubuntu 15.10:
apache2-bin 2.4.12-2ubuntu2.1

Ubuntu 14.04 LTS:
apache2.2-bin 2.4.7-1ubuntu4.13

Ubuntu 12.04 LTS:
apache2.2-bin 2.2.22-1ubuntu1.11

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-3038-1
CVE-2016-5387

Package Information:
https://launchpad.net/ubuntu/+source/apache2/2.4.18-2ubuntu3.1
https://launchpad.net/ubuntu/+source/apache2/2.4.12-2ubuntu2.1
https://launchpad.net/ubuntu/+source/apache2/2.4.7-1ubuntu4.13
https://launchpad.net/ubuntu/+source/apache2/2.2.22-1ubuntu1.11

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=x0dU
—–END PGP SIGNATURE—–

AutorTomislav Protega
Cert idNCERT-REF-2016-07-0059-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost programskog paketa httpd

Otkrivena je ranjivost u programskom paketu httpd za RHEL 5, 6 i 7. Ranjivost se isticala neštićenjem aplikacija od prisutnosti...

Close