[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20021112142332.D2BC333937@mail1.tamperd.net>
From: aliz at gentoo.org (Daniel Ahlberg)
Subject: GLSA: apache
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- - --------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200211-003
- - --------------------------------------------------------------------
PACKAGE : apache
SUMMARY : Cross-Site Scripting Vulnerability
DATE : 2002-11-12 14:11 UTC
EXPLOIT : local
- - --------------------------------------------------------------------
A vulnerability exists in the SSI error pages of Apache 2.0 that
involves incorrect filtering of server signature data.
The vulnerability could enable an attacker to hijack web sessions,
allowing a range of potential compromises on the targeted host.
Read the full advisory at
http://online.securityfocus.com/archive/1/293791
SOLUTION
It is recommended that all Gentoo Linux users who are running
net-www/apache-2.0.42 and earlier update their systems as follows:
emerge rsync
emerge apache
emerge clean
- - --------------------------------------------------------------------
aliz@...too.org - GnuPG key is available at www.gentoo.org/~aliz
- - --------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQE90Q7hfT7nyhUpoZMRArM0AJ4htFFr3gBDW5tga3p02/CAleoK/wCeK8gc
VMxVJ4+E8XG9wCy81Y1TwOA=
=wYi6
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists