[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4b0c72c4.FWpO9/bCbeMTUc7F%announce-noreply@rpath.com>
Date: Tue, 24 Nov 2009 18:56:52 -0500
From: rPath Update Announcements <announce-noreply@...th.com>
To: product-announce@...ts.rpath.com, security-announce@...ts.rpath.com,
update-announce@...ts.rpath.com
Cc: lwn@....net, full-disclosure@...ts.grok.org.uk, vulnwatch@...nwatch.org,
bugtraq@...urityfocus.com
Subject: rPSA-2009-0154-1 httpd mod_ssl
rPath Security Advisory: 2009-0154-1
Published: 2009-11-24
Products:
rPath Appliance Platform Linux Service 1
rPath Linux 1
Rating: Major
Exposure Level Classification:
Indirect Deterministic Weakness
Updated Versions:
httpd=conary.rpath.com@rpl:1/2.0.63-0.9-1
mod_ssl=conary.rpath.com@rpl:1/2.0.63-0.9-1
rPath Issue Tracking System:
https://issues.rpath.com/browse/RPL-3107
https://issues.rpath.com/browse/RPL-3146
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891
Description:
Previous versions of httpd are vulnerable to a man-in-the-middle attack
during TLS session renegotiation, sometimes referred to as the "Project
Mogul" issue. This vulnerability has been addressed in this update.
Additionally, two denial of service vulnerabilities and an access
restriction bypass in mod_proxy_ftp are resolved in this update.
http://wiki.rpath.com/Advisories:rPSA-2009-0154
Copyright 2009 rPath, Inc.
This file is distributed under the terms of the MIT License.
A copy is available at http://www.rpath.com/permanent/mit-license.html
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists