Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-1891 (GCVE-0-2009-1891)
Vulnerability from cvelistv5 – Published: 2009-07-10 15:00 – Updated: 2024-08-07 05:27- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T05:27:54.767Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[apache-httpd-dev] 20090628 mod_deflate DoS",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=apache-httpd-dev\u0026m=124621326524824\u0026w=2"
},
{
"name": "FEDORA-2009-8812",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01363.html"
},
{
"name": "SUSE-SA:2009:050",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0142"
},
{
"name": "35781",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35781"
},
{
"name": "PK99480",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK99480"
},
{
"name": "oval:org.mitre.oval:def:12361",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12361"
},
{
"name": "MDVSA-2009:149",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:149"
},
{
"name": "PK91361",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK91361"
},
{
"name": "SSRT090208",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2"
},
{
"name": "RHSA-2009:1156",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1156.html"
},
{
"name": "35865",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35865"
},
{
"name": "ADV-2009-1841",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/1841"
},
{
"name": "37152",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37152"
},
{
"name": "1022529",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1022529"
},
{
"name": "[apache-httpd-dev] 20090703 Re: mod_deflate DoS",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=apache-httpd-dev\u0026m=124661528519546\u0026w=2"
},
{
"name": "DSA-1834",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2009/dsa-1834"
},
{
"name": "20091113 rPSA-2009-0142-2 httpd mod_ssl",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/507857/100/0/threaded"
},
{
"name": "oval:org.mitre.oval:def:8632",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8632"
},
{
"name": "HPSBUX02612",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=129190899612998\u0026w=2"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712"
},
{
"name": "GLSA-200907-04",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-200907-04.xml"
},
{
"name": "HPSBOV02683",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://wiki.rpath.com/Advisories:rPSA-2009-0142"
},
{
"name": "RHSA-2009:1148",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1148.html"
},
{
"name": "oval:org.mitre.oval:def:9248",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9248"
},
{
"name": "USN-802-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-802-1"
},
{
"name": "37221",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/37221"
},
{
"name": "ADV-2009-3184",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"name": "SSRT100345",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=129190899612998\u0026w=2"
},
{
"name": "35793",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35793"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"name": "APPLE-SA-2009-11-09-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
},
{
"name": "35721",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/35721"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT3937"
},
{
"name": "55782",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/55782"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-06-28T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-06T10:09:13.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "[apache-httpd-dev] 20090628 mod_deflate DoS",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=apache-httpd-dev\u0026m=124621326524824\u0026w=2"
},
{
"name": "FEDORA-2009-8812",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01363.html"
},
{
"name": "SUSE-SA:2009:050",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0142"
},
{
"name": "35781",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35781"
},
{
"name": "PK99480",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK99480"
},
{
"name": "oval:org.mitre.oval:def:12361",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12361"
},
{
"name": "MDVSA-2009:149",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:149"
},
{
"name": "PK91361",
"tags": [
"vendor-advisory",
"x_refsource_AIXAPAR"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK91361"
},
{
"name": "SSRT090208",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2"
},
{
"name": "RHSA-2009:1156",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1156.html"
},
{
"name": "35865",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35865"
},
{
"name": "ADV-2009-1841",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/1841"
},
{
"name": "37152",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37152"
},
{
"name": "1022529",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1022529"
},
{
"name": "[apache-httpd-dev] 20090703 Re: mod_deflate DoS",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=apache-httpd-dev\u0026m=124661528519546\u0026w=2"
},
{
"name": "DSA-1834",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2009/dsa-1834"
},
{
"name": "20091113 rPSA-2009-0142-2 httpd mod_ssl",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/507857/100/0/threaded"
},
{
"name": "oval:org.mitre.oval:def:8632",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8632"
},
{
"name": "HPSBUX02612",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=129190899612998\u0026w=2"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712"
},
{
"name": "GLSA-200907-04",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-200907-04.xml"
},
{
"name": "HPSBOV02683",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://wiki.rpath.com/Advisories:rPSA-2009-0142"
},
{
"name": "RHSA-2009:1148",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1148.html"
},
{
"name": "oval:org.mitre.oval:def:9248",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9248"
},
{
"name": "USN-802-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-802-1"
},
{
"name": "37221",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/37221"
},
{
"name": "ADV-2009-3184",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"name": "SSRT100345",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=129190899612998\u0026w=2"
},
{
"name": "35793",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35793"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"name": "APPLE-SA-2009-11-09-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
},
{
"name": "35721",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/35721"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT3937"
},
{
"name": "55782",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/55782"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210603 svn commit: r1075360 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210603 svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2009-1891",
"datePublished": "2009-07-10T15:00:00.000Z",
"dateReserved": "2009-06-02T00:00:00.000Z",
"dateUpdated": "2024-08-07T05:27:54.767Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2009-1891\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2009-07-10T15:30:00.187\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).\"},{\"lang\":\"es\",\"value\":\"El m\u00f3dulo mod_deflate en Apache httpd v2.2.11 y anteriores comprime archivos de gran tama\u00f1o hasta finalizar incluso despu\u00e9s de que la conexi\u00f3n de red asociada est\u00e1 cerrada, lo cual permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU).\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:C\",\"baseScore\":7.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.0.35\",\"versionEndExcluding\":\"2.0.64\",\"matchCriteriaId\":\"838655CB-43E7-4BDA-A80C-2314C9870717\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.2.0\",\"versionEndExcluding\":\"2.2.12\",\"matchCriteriaId\":\"8BBBCFC4-2CFE-42A2-BE6F-2710EB3921A9\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F92AB32-E7DE-43F4-B877-1F41FA162EC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036E8A89-7A16-411F-9D31-676313BB7244\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3BB5EDB-520B-4DEF-B06E-65CA13152824\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"7EBFE35C-E243-43D1-883D-4398D71763CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4747CC68-FAF4-482F-929A-9DA6C24CB663\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D026D0-EF78-438D-BEDD-FC8571F3ACEB\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133AAFA7-AF42-4D7B-8822-AA2E85611BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"941713DB-B1DE-4953-9A9C-174EAFDCB3E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D669D4-6D7E-449D-80C1-28FA44F06FFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F87B994-28E4-4095-8770-6433DE9C93AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0AC5CD5-6E58-433C-9EB3-6DFE5656463E\"}]}]}],\"references\":[{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=apache-httpd-dev\u0026m=124621326524824\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=apache-httpd-dev\u0026m=124661528519546\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=129190899612998\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://osvdb.org/55782\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/35721\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Not Applicable\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35781\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Not Applicable\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35793\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Not Applicable\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35865\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Not Applicable\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37152\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Not Applicable\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37221\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Not Applicable\",\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200907-04.xml\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3937\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2009-0142\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0142\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1PK91361\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1PK99480\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1834\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:149\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1156.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/507857/100/0/threaded\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1022529\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-802-1\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1841\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3184\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=509125\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12361\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8632\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9248\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1148.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01363.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Mailing List\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=apache-httpd-dev\u0026m=124621326524824\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=apache-httpd-dev\u0026m=124661528519546\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=129190899612998\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://osvdb.org/55782\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/35721\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35781\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35793\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/35865\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37152\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\",\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37221\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Not Applicable\",\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200907-04.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT3937\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://wiki.rpath.com/Advisories:rPSA-2009-0142\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0142\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1PK91361\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1PK99480\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2009/dsa-1834\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:149\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Patch\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1156.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/507857/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1022529\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-802-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/1841\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3184\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=509125\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12361\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8632\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9248\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1148.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01363.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]}]}}"
}
}
CERTA-2010-AVI-211
Vulnerability from certfr_avis - Published: 2010-05-14 - Updated: 2010-05-14
IBM publie un correctif cumulatif remédiant à des vulnérabilités de son serveur HTTP dont les plus graves permettent à un utilisateur malveillant d'exécuter du code arbitraire à distance.
Description
Plusieurs vulnérabilités sont corrigées dans le correctif cumulatif. Elles permettaient à un utilisateur malveillant de réaliser :
- de l'exécution de code arbitraire à distance ;
- un déni de service à distance ;
- un contournement de la politique de sécurité ;
- une atteinte à la confidentialité des données ;
- une élévation de privilèges ;
- de l'injection de code indirecte à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
IBM HTTP Server 2.x.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eIBM HTTP Server 2.x.\u003c/p\u003e",
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s sont corrig\u00e9es dans le correctif cumulatif.\nElles permettaient \u00e0 un utilisateur malveillant de r\u00e9aliser\u00a0:\n\n- de l\u0027ex\u00e9cution de code arbitraire \u00e0 distance ;\n- un d\u00e9ni de service \u00e0 distance ;\n- un contournement de la politique de s\u00e9curit\u00e9 ;\n- une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es ;\n- une \u00e9l\u00e9vation de privil\u00e8ges ;\n- de l\u0027injection de code indirecte \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2008-0005",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0005"
},
{
"name": "CVE-2010-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0434"
},
{
"name": "CVE-2009-3094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3094"
},
{
"name": "CVE-2009-3095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3095"
},
{
"name": "CVE-2010-0425",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0425"
},
{
"name": "CVE-2009-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
},
{
"name": "CVE-2009-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1891"
},
{
"name": "CVE-2009-0023",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0023"
},
{
"name": "CVE-2009-1956",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1956"
},
{
"name": "CVE-2009-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2412"
},
{
"name": "CVE-2008-2364",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2364"
},
{
"name": "CVE-2008-2939",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2939"
},
{
"name": "CVE-2009-1955",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1955"
}
],
"initial_release_date": "2010-05-14T00:00:00",
"last_revision_date": "2010-05-14T00:00:00",
"links": [],
"reference": "CERTA-2010-AVI-211",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2010-05-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "IBM publie un correctif cumulatif rem\u00e9diant \u00e0 des vuln\u00e9rabilit\u00e9s de son\nserveur HTTP dont les plus graves permettent \u00e0 un utilisateur\nmalveillant d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans le serveur HTTP d\u0027IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg1PM10658 du 10 mai 2010",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM10658"
}
]
}
CERTA-2011-AVI-524
Vulnerability from certfr_avis - Published: 2011-09-19 - Updated: 2011-09-19
De multiples vulnérabilités touchent Blue Coat Director, elles permettent notamment l'exécution de code arbitraire à distance.
Description
Des vulnérabilités dans le module d'analyse des requêtes HTTP TRACE et dans les versions d'Apache et OpenSSL embarquées dans Blue Coat Director permettent à une personne malintentionnée d'effectuer des actions malveillantes, dont l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Blue Coat Director toutes versions antérieures à la 5.5.2.3.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003eBlue Coat Director toutes versions ant\u00e9rieures \u00e0 la 5.5.2.3.\u003c/p\u003e",
"content": "## Description\n\nDes vuln\u00e9rabilit\u00e9s dans le module d\u0027analyse des requ\u00eates HTTP TRACE et\ndans les versions d\u0027Apache et OpenSSL embarqu\u00e9es dans Blue Coat Director\npermettent \u00e0 une personne malintentionn\u00e9e d\u0027effectuer des actions\nmalveillantes, dont l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3560"
},
{
"name": "CVE-2010-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0434"
},
{
"name": "CVE-2010-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1623"
},
{
"name": "CVE-2009-3094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3094"
},
{
"name": "CVE-2009-3095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3095"
},
{
"name": "CVE-2010-0425",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0425"
},
{
"name": "CVE-2010-1452",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1452"
},
{
"name": "CVE-2009-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
},
{
"name": "CVE-2009-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1891"
},
{
"name": "CVE-2009-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2412"
},
{
"name": "CVE-2003-0190",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-0190"
},
{
"name": "CVE-2008-2364",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2364"
},
{
"name": "CVE-2008-2939",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2939"
},
{
"name": "CVE-2005-2666",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2666"
},
{
"name": "CVE-2009-3720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3720"
}
],
"initial_release_date": "2011-09-19T00:00:00",
"last_revision_date": "2011-09-19T00:00:00",
"links": [],
"reference": "CERTA-2011-AVI-524",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-09-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s touchent Blue Coat Director, elles\npermettent notamment l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Blue Coat Director",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Blue Coat SA61 du 13 septembre 2011",
"url": "https://kb.bluecoat.com/index?page=content\u0026id=SA61"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Blue Coat SA63 du 15 septembre 2011",
"url": "https://kb.bluecoat.com/index?page=content\u0026id=SA63"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Blue Coat SA62 du 15 septembre 2011",
"url": "https://kb.bluecoat.com/index?page=content\u0026id=SA62"
}
]
}
CERTA-2012-AVI-023
Vulnerability from certfr_avis - Published: 2012-01-18 - Updated: 2012-01-18
Plusieurs vulnérabilités découvertes dans les produits IBM ont été corrigées par l'éditeur.
Description
Plusieurs vulnérabilités dans les produits IBM peuvent être exploitées par une personne malintentionnée afin de contourner la politique de sécurité, d'injecter du code indirect à distance, de réaliser un déni de service distant, d'élever ses privilèges ou encore d'exécuter du code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Rational License Key Server 8.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server 6.1.x ;",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server 7.0.x ;",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM HTTP Server 7.0.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server 8.0.x ;",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s dans les produits IBM peuvent \u00eatre exploit\u00e9es\npar une personne malintentionn\u00e9e afin de contourner la politique de\ns\u00e9curit\u00e9, d\u0027injecter du code indirect \u00e0 distance, de r\u00e9aliser un d\u00e9ni de\nservice distant, d\u0027\u00e9lever ses privil\u00e8ges ou encore d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"name": "CVE-2009-1890",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1890"
},
{
"name": "CVE-2011-3348",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3348"
},
{
"name": "CVE-2009-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3560"
},
{
"name": "CVE-2011-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1389"
},
{
"name": "CVE-2010-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0434"
},
{
"name": "CVE-2010-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1623"
},
{
"name": "CVE-2009-3094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3094"
},
{
"name": "CVE-2009-3095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3095"
},
{
"name": "CVE-2010-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2068"
},
{
"name": "CVE-2010-1452",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1452"
},
{
"name": "CVE-2009-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
},
{
"name": "CVE-2009-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1891"
},
{
"name": "CVE-2009-0023",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0023"
},
{
"name": "CVE-2009-1956",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1956"
},
{
"name": "CVE-2009-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2412"
},
{
"name": "CVE-2011-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3607"
},
{
"name": "CVE-2009-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1195"
},
{
"name": "CVE-2010-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0408"
},
{
"name": "CVE-2011-3368",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3368"
},
{
"name": "CVE-2011-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3639"
},
{
"name": "CVE-2011-4317",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4317"
},
{
"name": "CVE-2009-3720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3720"
},
{
"name": "CVE-2011-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0419"
},
{
"name": "CVE-2009-1955",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1955"
}
],
"initial_release_date": "2012-01-18T00:00:00",
"last_revision_date": "2012-01-18T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg21577760 du 10 janvier 2012 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21577760"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg27014506 du 16 janvier 2012 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27014506"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg1PM54061 du 12 janvier 2012 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM54061"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg1PM48384 du 21 septembre 2011 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM48384"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg24031821 du 17 janvier 2012 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg24031821"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg1PM50426 du 19 octobre 2011 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM50426"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg1PM45731 du 12 janvier 2012 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM45731"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg227022958 du 16 janvier 2012 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg227022958"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg1PM47852 du 14 septembre 2011 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM47852"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg227014463 du 16 janvier 2012 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg227014463"
}
],
"reference": "CERTA-2012-AVI-023",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-01-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans les produits IBM ont \u00e9t\u00e9\ncorrig\u00e9es par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": []
}
CERTA-2009-AVI-471
Vulnerability from certfr_avis - Published: 2009-11-03 - Updated: 2009-11-03
Plusieurs vulnérabilités dans IBM WebSphere permettent de provoquer un déni de service à distance ou d'injecter des requêtes illégitimes par rebond.
Description
De multiples vulnérabilités ont été découvertes dans IBM WebSphere :
- plusieurs vulnérabilités permettent de provoquer un déni de service à distance sur l'APR Apache ;
- une erreur de traitement dans l'interface Apr_xml_* permet de provoquer un déni de service ;
- la console d'administration permet aux utilisateurs d'effectuer des actions malveillantes par le biais de requêtes HTTP non vérifiées ;
- une erreur de traitement dans le serveur Web embarqué permet de provoquer un déni de service par le biais de requêtes HTTP spécialement conçues.
Solution
Se référer aux bulletins de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM WebSphere Application Server 7.0.x.",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM WebSphere :\n\n- plusieurs vuln\u00e9rabilit\u00e9s permettent de provoquer un d\u00e9ni de service\n \u00e0 distance sur l\u0027APR Apache ;\n- une erreur de traitement dans l\u0027interface Apr_xml\\_\\* permet de\n provoquer un d\u00e9ni de service ;\n- la console d\u0027administration permet aux utilisateurs d\u0027effectuer des\n actions malveillantes par le biais de requ\u00eates HTTP non v\u00e9rifi\u00e9es ;\n- une erreur de traitement dans le serveur Web embarqu\u00e9 permet de\n provoquer un d\u00e9ni de service par le biais de requ\u00eates HTTP\n sp\u00e9cialement con\u00e7ues.\n\n## Solution\n\nSe r\u00e9f\u00e9rer aux bulletins de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1891"
},
{
"name": "CVE-2009-0023",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0023"
},
{
"name": "CVE-2009-1956",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1956"
}
],
"initial_release_date": "2009-11-03T00:00:00",
"last_revision_date": "2009-11-03T00:00:00",
"links": [
{
"title": "R\u00e9f\u00e9rence Bulletin de s\u00e9curit\u00e9 IBM PK99477 du 29 octobre 2009 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK99477"
},
{
"title": "R\u00e9f\u00e9rence Bulletin de s\u00e9curit\u00e9 IBM PK99480 du 29 octobre 2009 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK99480"
},
{
"title": "R\u00e9f\u00e9rence Bulletin de s\u00e9curit\u00e9 IBM PK99478 du 29 octobre 2009 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478"
}
],
"reference": "CERTA-2009-AVI-471",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-11-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans IBM WebSphere permettent de provoquer un\nd\u00e9ni de service \u00e0 distance ou d\u0027injecter des requ\u00eates ill\u00e9gitimes par\nrebond.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM WebSphere pour z/OS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM PK99478 du 29 octobre 2009",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM PK99480 du 29 octobre 2009",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM PK99477 du 29 octobre 2009",
"url": null
}
]
}
CERTA-2009-AVI-529
Vulnerability from certfr_avis - Published: 2009-12-04 - Updated: 2009-12-04
Plusieurs vulnérabilités présentes dans IBM WebSphere ont été corrigées. Ces vulnérabilités permettent de provoquer un déni de service à distance ou de contourner la politique de sécurité.
Description
Plusieurs vulnérabilités, de type dépassement d'entier, ont été découvertes dans les outils de la librairie d'exécution Apache Portable Runtime (APR-Utility) utilisée par IBM WebSphere. Ces vulnérabilités permettent à une personne distante malintentionnée d'exécuter du code arbitraire.
De nombreuses vulnérabilités ont été découvertes dans le serveur HTTP. L'exploitation de ces vulnérabilités permet d'accéder à des informations sensibles ou de réaliser un déni de service à distance.
Deux vulnérabilités concernent le module mod_proxy_ftp. La première est de type pointeur nul et permet de provoquer un déni de service par le biais d'un serveur FTP construit de manière particulière. La seconde permet à un attaquant d'envoyer des commandes FTP arbitraires en utilisant le serveur Apache en tant que serveur mandataire.
Une vulnérabilité a été identifiée dans les protocole SSL et TLS lors de renégociations de sessions. Un utilisateur s'étant au préalable intercalé dans la transmissions (man in the middle) peut, dans certaines circonstances, injecter des données au détriment d'un utilisateur légitime, pour, par exemple, forcer l'envoi d'une requête HTTP au serveur vers lequel la victime se connecte.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
IBM WebSphere, versions 6.0.x sur systèmes z/OS.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cSPAN class=\"textit\"\u003eIBM WebSphere\u003c/SPAN\u003e, versions 6.0.x sur syst\u00e8mes \u003cSPAN class=\n \"textit\"\u003ez/OS\u003c/SPAN\u003e.",
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s, de type d\u00e9passement d\u0027entier, ont \u00e9t\u00e9\nd\u00e9couvertes dans les outils de la librairie d\u0027ex\u00e9cution Apache Portable\nRuntime (APR-Utility) utilis\u00e9e par IBM WebSphere. Ces vuln\u00e9rabilit\u00e9s\npermettent \u00e0 une personne distante malintentionn\u00e9e d\u0027ex\u00e9cuter du code\narbitraire.\n\nDe nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le serveur HTTP.\nL\u0027exploitation de ces vuln\u00e9rabilit\u00e9s permet d\u0027acc\u00e9der \u00e0 des informations\nsensibles ou de r\u00e9aliser un d\u00e9ni de service \u00e0 distance.\n\nDeux vuln\u00e9rabilit\u00e9s concernent le module mod_proxy_ftp. La premi\u00e8re est\nde type pointeur nul et permet de provoquer un d\u00e9ni de service par le\nbiais d\u0027un serveur FTP construit de mani\u00e8re particuli\u00e8re. La seconde\npermet \u00e0 un attaquant d\u0027envoyer des commandes FTP arbitraires en\nutilisant le serveur Apache en tant que serveur mandataire.\n\nUne vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 identifi\u00e9e dans les protocole SSL et TLS lors de\nren\u00e9gociations de sessions. Un utilisateur s\u0027\u00e9tant au pr\u00e9alable\nintercal\u00e9 dans la transmissions (man in the middle) peut, dans certaines\ncirconstances, injecter des donn\u00e9es au d\u00e9triment d\u0027un utilisateur\nl\u00e9gitime, pour, par exemple, forcer l\u0027envoi d\u0027une requ\u00eate HTTP au\nserveur vers lequel la victime se connecte.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-3094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3094"
},
{
"name": "CVE-2009-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
},
{
"name": "CVE-2009-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1891"
},
{
"name": "CVE-2009-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2412"
}
],
"initial_release_date": "2009-12-04T00:00:00",
"last_revision_date": "2009-12-04T00:00:00",
"links": [
{
"title": "Document du CERTA CERTA-2009-AVI-424 du 07 octobre 2009 :",
"url": "http://www.certa.ssi.gouv.fr/site/CERTA-2009-AVI-424/index.html"
},
{
"title": "Document du CERTA CERTA-2009-AVI-323 du 20 octobre 2009 :",
"url": "http://www.certa.ssi.gouv.fr/site/CERTA-2009-AVI-323/index.html"
},
{
"title": "Document du CERTA CERTA-2009-AVI-482 du 27 novembre 2009 :",
"url": "http://www.certa.ssi.gouv.fr/site/CERTA-2009-AVI-482/index.html"
},
{
"title": "Document du CERTA CERTA-2009-AVI-408 du 25 septembre 2009 :",
"url": "http://www.certa.ssi.gouv.fr/site/CERTA-2009-AVI-408/index.html"
}
],
"reference": "CERTA-2009-AVI-529",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-12-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s pr\u00e9sentes dans \u003cspan class=\"textit\"\u003eIBM\nWebSphere\u003c/span\u003e ont \u00e9t\u00e9 corrig\u00e9es. Ces vuln\u00e9rabilit\u00e9s permettent de\nprovoquer un d\u00e9ni de service \u00e0 distance ou de contourner la politique de\ns\u00e9curit\u00e9.\n",
"title": "Vuln\u00e9rabilit\u00e9s dans IBM WebSphere",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg1PK96157 du 02 d\u00e9cembre 2009",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK96157"
}
]
}
CERTA-2009-AVI-487
Vulnerability from certfr_avis - Published: 2009-11-10 - Updated: 2009-11-10
De multiples vulnérabilités dans Apple MacOS X permettent entre autres l'exécution de code arbitraire à distance.
Description
L'éditeur Apple a publié un ensemble de correctifs pour les applications livrées avec son système d'exploitation Mac OS X. L'exploitation des vulnérabilités par une personne malintentionnée pourrait permettre, entre autres, l'exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mac OS X 10.5 ;",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X 10.6 ;",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Server 10.5 ;",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Mac OS X Server 10.6.",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nL\u0027\u00e9diteur Apple a publi\u00e9 un ensemble de correctifs pour les applications\nlivr\u00e9es avec son syst\u00e8me d\u0027exploitation Mac OS X. L\u0027exploitation des\nvuln\u00e9rabilit\u00e9s par une personne malintentionn\u00e9e pourrait permettre,\nentre autres, l\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2832",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2832"
},
{
"name": "CVE-2009-3293",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3293"
},
{
"name": "CVE-2009-2820",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2820"
},
{
"name": "CVE-2009-1890",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1890"
},
{
"name": "CVE-2009-3292",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3292"
},
{
"name": "CVE-2009-2839",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2839"
},
{
"name": "CVE-2009-2825",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2825"
},
{
"name": "CVE-2009-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2810"
},
{
"name": "CVE-2009-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2411"
},
{
"name": "CVE-2009-2408",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2408"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2009-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2798"
},
{
"name": "CVE-2007-6698",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6698"
},
{
"name": "CVE-2009-2833",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2833"
},
{
"name": "CVE-2009-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2203"
},
{
"name": "CVE-2009-2823",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2823"
},
{
"name": "CVE-2009-2840",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2840"
},
{
"name": "CVE-2009-2824",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2824"
},
{
"name": "CVE-2009-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2819"
},
{
"name": "CVE-2009-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1891"
},
{
"name": "CVE-2009-0023",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0023"
},
{
"name": "CVE-2009-2838",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2838"
},
{
"name": "CVE-2009-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1632"
},
{
"name": "CVE-2009-2818",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2818"
},
{
"name": "CVE-2009-1956",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1956"
},
{
"name": "CVE-2007-5707",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5707"
},
{
"name": "CVE-2008-0658",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0658"
},
{
"name": "CVE-2009-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2412"
},
{
"name": "CVE-2009-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1195"
},
{
"name": "CVE-2009-1191",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1191"
},
{
"name": "CVE-2009-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2808"
},
{
"name": "CVE-2009-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2830"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2009-3111",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3111"
},
{
"name": "CVE-2009-2829",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2829"
},
{
"name": "CVE-2009-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2826"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2285"
},
{
"name": "CVE-2009-3291",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3291"
},
{
"name": "CVE-2009-2837",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2837"
},
{
"name": "CVE-2009-2409",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2409"
},
{
"name": "CVE-2009-2836",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2836"
},
{
"name": "CVE-2009-2799",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2799"
},
{
"name": "CVE-2009-1574",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1574"
},
{
"name": "CVE-2009-2835",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2835"
},
{
"name": "CVE-2009-2831",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2831"
},
{
"name": "CVE-2009-3235",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3235"
},
{
"name": "CVE-2009-1955",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1955"
},
{
"name": "CVE-2009-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2828"
},
{
"name": "CVE-2009-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2202"
}
],
"initial_release_date": "2009-11-10T00:00:00",
"last_revision_date": "2009-11-10T00:00:00",
"links": [],
"reference": "CERTA-2009-AVI-487",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-11-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s dans Apple MacOS X permettent entre autres\nl\u0027ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple MacOS X",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT3937 du 09 novembre 2009",
"url": "http://docs.info.apple.com/article.html?artnum=HT3937"
}
]
}
CERTA-2009-AVI-408
Vulnerability from certfr_avis - Published: 2009-09-25 - Updated: 2009-09-25
De multiples vulnérabilités permettant d'accéder à des données sensibles ou de réaliser un déni de service ont été découvertes dans le serveur Internet IBM HTTP Server.
Description
De nombreuses vulnérabilités ont été découvertes dans le serveur IBM HTTP Server. L'exploitation de ces vulnérabilités permet d'accéder à des informations sensibles ou de réaliser un déni de service à distance.
L'éditeur n'a pas fourni plus d'informations sur l'exploitation de ces vulnérabilités.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM HTTP Server versions 6.1.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM HTTP Server versions 6.0.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM HTTP Server versions 7.0.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nDe nombreuses vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le serveur IBM\nHTTP Server. L\u0027exploitation de ces vuln\u00e9rabilit\u00e9s permet d\u0027acc\u00e9der \u00e0 des\ninformations sensibles ou de r\u00e9aliser un d\u00e9ni de service \u00e0 distance.\n\nL\u0027\u00e9diteur n\u0027a pas fourni plus d\u0027informations sur l\u0027exploitation de ces\nvuln\u00e9rabilit\u00e9s.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-1890",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1890"
},
{
"name": "CVE-2009-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1891"
},
{
"name": "CVE-2009-0023",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0023"
},
{
"name": "CVE-2009-1956",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1956"
},
{
"name": "CVE-2009-1955",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1955"
}
],
"initial_release_date": "2009-09-25T00:00:00",
"last_revision_date": "2009-09-25T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg24023947 du 08 septembre 2009 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg24023947"
}
],
"reference": "CERTA-2009-AVI-408",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2009-09-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s permettant d\u0027acc\u00e9der \u00e0 des donn\u00e9es sensibles\nou de r\u00e9aliser un d\u00e9ni de service ont \u00e9t\u00e9 d\u00e9couvertes dans le serveur\nInternet IBM HTTP Server.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM HTTP Server",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 4023947 du 08 septembre 2009",
"url": null
}
]
}
GSD-2009-1891
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2009-1891",
"description": "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).",
"id": "GSD-2009-1891",
"references": [
"https://www.suse.com/security/cve/CVE-2009-1891.html",
"https://www.debian.org/security/2009/dsa-1834",
"https://access.redhat.com/errata/RHSA-2010:0602",
"https://access.redhat.com/errata/RHSA-2009:1580",
"https://access.redhat.com/errata/RHSA-2009:1205",
"https://access.redhat.com/errata/RHSA-2009:1160",
"https://access.redhat.com/errata/RHSA-2009:1156",
"https://access.redhat.com/errata/RHSA-2009:1155",
"https://access.redhat.com/errata/RHSA-2009:1148",
"https://linux.oracle.com/cve/CVE-2009-1891.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2009-1891"
],
"details": "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).",
"id": "GSD-2009-1891",
"modified": "2023-12-13T01:19:47.921157Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-1891",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://marc.info/?l=bugtraq\u0026m=129190899612998\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=bugtraq\u0026m=129190899612998\u0026w=2"
},
{
"name": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2"
},
{
"name": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html",
"refsource": "MISC",
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
},
{
"name": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html",
"refsource": "MISC",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html"
},
{
"name": "http://secunia.com/advisories/37152",
"refsource": "MISC",
"url": "http://secunia.com/advisories/37152"
},
{
"name": "http://secunia.com/advisories/37221",
"refsource": "MISC",
"url": "http://secunia.com/advisories/37221"
},
{
"name": "http://support.apple.com/kb/HT3937",
"refsource": "MISC",
"url": "http://support.apple.com/kb/HT3937"
},
{
"name": "http://www.vupen.com/english/advisories/2009/3184",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"name": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "http://secunia.com/advisories/35721",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35721"
},
{
"name": "http://security.gentoo.org/glsa/glsa-200907-04.xml",
"refsource": "MISC",
"url": "http://security.gentoo.org/glsa/glsa-200907-04.xml"
},
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712",
"refsource": "MISC",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712"
},
{
"name": "http://marc.info/?l=apache-httpd-dev\u0026m=124621326524824\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=apache-httpd-dev\u0026m=124621326524824\u0026w=2"
},
{
"name": "http://marc.info/?l=apache-httpd-dev\u0026m=124661528519546\u0026w=2",
"refsource": "MISC",
"url": "http://marc.info/?l=apache-httpd-dev\u0026m=124661528519546\u0026w=2"
},
{
"name": "http://osvdb.org/55782",
"refsource": "MISC",
"url": "http://osvdb.org/55782"
},
{
"name": "http://secunia.com/advisories/35781",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35781"
},
{
"name": "http://secunia.com/advisories/35793",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35793"
},
{
"name": "http://secunia.com/advisories/35865",
"refsource": "MISC",
"url": "http://secunia.com/advisories/35865"
},
{
"name": "http://wiki.rpath.com/Advisories:rPSA-2009-0142",
"refsource": "MISC",
"url": "http://wiki.rpath.com/Advisories:rPSA-2009-0142"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0142",
"refsource": "MISC",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0142"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK91361",
"refsource": "MISC",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK91361"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK99480",
"refsource": "MISC",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK99480"
},
{
"name": "http://www.debian.org/security/2009/dsa-1834",
"refsource": "MISC",
"url": "http://www.debian.org/security/2009/dsa-1834"
},
{
"name": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:149",
"refsource": "MISC",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:149"
},
{
"name": "http://www.redhat.com/support/errata/RHSA-2009-1156.html",
"refsource": "MISC",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1156.html"
},
{
"name": "http://www.securityfocus.com/archive/1/507857/100/0/threaded",
"refsource": "MISC",
"url": "http://www.securityfocus.com/archive/1/507857/100/0/threaded"
},
{
"name": "http://www.securitytracker.com/id?1022529",
"refsource": "MISC",
"url": "http://www.securitytracker.com/id?1022529"
},
{
"name": "http://www.ubuntu.com/usn/USN-802-1",
"refsource": "MISC",
"url": "http://www.ubuntu.com/usn/USN-802-1"
},
{
"name": "http://www.vupen.com/english/advisories/2009/1841",
"refsource": "MISC",
"url": "http://www.vupen.com/english/advisories/2009/1841"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12361",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12361"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8632",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8632"
},
{
"name": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9248",
"refsource": "MISC",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9248"
},
{
"name": "https://rhn.redhat.com/errata/RHSA-2009-1148.html",
"refsource": "MISC",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1148.html"
},
{
"name": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01363.html",
"refsource": "MISC",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01363.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=509125",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.0.64",
"versionStartIncluding": "2.0.35",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.2.12",
"versionStartIncluding": "2.2.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2009-1891"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712",
"refsource": "MISC",
"tags": [
"Exploit"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712"
},
{
"name": "MDVSA-2009:149",
"refsource": "MANDRIVA",
"tags": [
"Broken Link",
"Patch"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:149"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=509125",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"name": "[apache-httpd-dev] 20090703 Re: mod_deflate DoS",
"refsource": "MLIST",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=apache-httpd-dev\u0026m=124661528519546\u0026w=2"
},
{
"name": "RHSA-2009:1148",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1148.html"
},
{
"name": "[apache-httpd-dev] 20090628 mod_deflate DoS",
"refsource": "MLIST",
"tags": [
"Exploit",
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=apache-httpd-dev\u0026m=124621326524824\u0026w=2"
},
{
"name": "35865",
"refsource": "SECUNIA",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35865"
},
{
"name": "DSA-1834",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2009/dsa-1834"
},
{
"name": "RHSA-2009:1156",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1156.html"
},
{
"name": "1022529",
"refsource": "SECTRACK",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1022529"
},
{
"name": "35781",
"refsource": "SECUNIA",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35781"
},
{
"name": "35793",
"refsource": "SECUNIA",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35793"
},
{
"name": "35721",
"refsource": "SECUNIA",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35721"
},
{
"name": "ADV-2009-1841",
"refsource": "VUPEN",
"tags": [
"Permissions Required",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1841"
},
{
"name": "GLSA-200907-04",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200907-04.xml"
},
{
"name": "55782",
"refsource": "OSVDB",
"tags": [
"Broken Link"
],
"url": "http://osvdb.org/55782"
},
{
"name": "USN-802-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-802-1"
},
{
"name": "FEDORA-2009-8812",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01363.html"
},
{
"name": "37152",
"refsource": "SECUNIA",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37152"
},
{
"name": "SUSE-SA:2009:050",
"refsource": "SUSE",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html"
},
{
"name": "http://support.apple.com/kb/HT3937",
"refsource": "CONFIRM",
"tags": [
"Broken Link"
],
"url": "http://support.apple.com/kb/HT3937"
},
{
"name": "APPLE-SA-2009-11-09-1",
"refsource": "APPLE",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
},
{
"name": "ADV-2009-3184",
"refsource": "VUPEN",
"tags": [
"Permissions Required",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"name": "PK91361",
"refsource": "AIXAPAR",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK91361"
},
{
"name": "37221",
"refsource": "SECUNIA",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37221"
},
{
"name": "PK99480",
"refsource": "AIXAPAR",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK99480"
},
{
"name": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0142",
"refsource": "CONFIRM",
"tags": [
"Broken Link"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0142"
},
{
"name": "http://wiki.rpath.com/Advisories:rPSA-2009-0142",
"refsource": "CONFIRM",
"tags": [
"Broken Link"
],
"url": "http://wiki.rpath.com/Advisories:rPSA-2009-0142"
},
{
"name": "HPSBUX02612",
"refsource": "HP",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=129190899612998\u0026w=2"
},
{
"name": "SSRT090208",
"refsource": "HP",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2"
},
{
"name": "oval:org.mitre.oval:def:9248",
"refsource": "OVAL",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9248"
},
{
"name": "oval:org.mitre.oval:def:8632",
"refsource": "OVAL",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8632"
},
{
"name": "oval:org.mitre.oval:def:12361",
"refsource": "OVAL",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12361"
},
{
"name": "20091113 rPSA-2009-0142-2 httpd mod_ssl",
"refsource": "BUGTRAQ",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/507857/100/0/threaded"
},
{
"name": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E"
},
{
"name": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E",
"refsource": "MISC",
"tags": [],
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T02:20Z",
"publishedDate": "2009-07-10T15:30Z"
}
}
}
RHSA-2009:1155
Vulnerability from csaf_redhat - Published: 2009-07-14 19:07 - Updated: 2025-11-21 17:34The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.
The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated httpd packages that fix multiple security issues are now available\nfor JBoss Enterprise Web Server 1.0.0 for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache HTTP Server is a popular Web server.\n\nA denial of service flaw was found in the Apache mod_proxy module when it\nwas used as a reverse proxy. A remote attacker could use this flaw to force\na proxy process to consume large amounts of CPU time. (CVE-2009-1890)\n\nA flaw was found in the handling of the \"Options\" and \"AllowOverride\"\ndirectives used by the Apache HTTP Server. In configurations using the\n\"AllowOverride\" directive with certain \"Options=\" arguments, local users\nwere not restricted from executing commands from a Server-Side-Include\nscript as intended. (CVE-2009-1195)\n\nA denial of service flaw was found in the Apache mod_deflate module. This\nmodule continued to compress large files until compression was complete,\neven if the network connection that requested the content was closed before\ncompression completed. This would cause mod_deflate to consume large\namounts of CPU if mod_deflate was enabled for a large file. (CVE-2009-1891)\n\nAll users of JBoss Enterprise Web Server 1.0.0 should upgrade to these\nupdated packages, which contain backported patches to correct these issues.\nAfter installing the updated packages, the httpd daemon must be restarted\nfor the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1155",
"url": "https://access.redhat.com/errata/RHSA-2009:1155"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "489436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=489436"
},
{
"category": "external",
"summary": "509125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"category": "external",
"summary": "509375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509375"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1155.json"
}
],
"title": "Red Hat Security Advisory: httpd security update",
"tracking": {
"current_release_date": "2025-11-21T17:34:52+00:00",
"generator": {
"date": "2025-11-21T17:34:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1155",
"initial_release_date": "2009-07-14T19:07:00+00:00",
"revision_history": [
{
"date": "2009-07-14T19:07:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-07-14T15:07:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:34:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product": {
"name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el5"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.2.10-10.ep5.el5.src",
"product": {
"name": "httpd-0:2.2.10-10.ep5.el5.src",
"product_id": "httpd-0:2.2.10-10.ep5.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.10-10.ep5.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.2.10-10.ep5.el5.x86_64",
"product": {
"name": "httpd-0:2.2.10-10.ep5.el5.x86_64",
"product_id": "httpd-0:2.2.10-10.ep5.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.10-10.ep5.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.10-10.ep5.el5.x86_64",
"product": {
"name": "httpd-devel-0:2.2.10-10.ep5.el5.x86_64",
"product_id": "httpd-devel-0:2.2.10-10.ep5.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.10-10.ep5.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.10-10.ep5.el5.x86_64",
"product": {
"name": "httpd-manual-0:2.2.10-10.ep5.el5.x86_64",
"product_id": "httpd-manual-0:2.2.10-10.ep5.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.10-10.ep5.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.10-10.ep5.el5.x86_64",
"product": {
"name": "mod_ssl-1:2.2.10-10.ep5.el5.x86_64",
"product_id": "mod_ssl-1:2.2.10-10.ep5.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.10-10.ep5.el5?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.2.10-10.ep5.el5.i386",
"product": {
"name": "httpd-0:2.2.10-10.ep5.el5.i386",
"product_id": "httpd-0:2.2.10-10.ep5.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.10-10.ep5.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.10-10.ep5.el5.i386",
"product": {
"name": "httpd-devel-0:2.2.10-10.ep5.el5.i386",
"product_id": "httpd-devel-0:2.2.10-10.ep5.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.10-10.ep5.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.10-10.ep5.el5.i386",
"product": {
"name": "httpd-manual-0:2.2.10-10.ep5.el5.i386",
"product_id": "httpd-manual-0:2.2.10-10.ep5.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.10-10.ep5.el5?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.10-10.ep5.el5.i386",
"product": {
"name": "mod_ssl-1:2.2.10-10.ep5.el5.i386",
"product_id": "mod_ssl-1:2.2.10-10.ep5.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.10-10.ep5.el5?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.10-10.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.i386"
},
"product_reference": "httpd-0:2.2.10-10.ep5.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.10-10.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.src"
},
"product_reference": "httpd-0:2.2.10-10.ep5.el5.src",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.10-10.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.x86_64"
},
"product_reference": "httpd-0:2.2.10-10.ep5.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.10-10.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.10-10.ep5.el5.i386"
},
"product_reference": "httpd-devel-0:2.2.10-10.ep5.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.10-10.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-devel-0:2.2.10-10.ep5.el5.x86_64"
},
"product_reference": "httpd-devel-0:2.2.10-10.ep5.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.10-10.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.10-10.ep5.el5.i386"
},
"product_reference": "httpd-manual-0:2.2.10-10.ep5.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.10-10.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:httpd-manual-0:2.2.10-10.ep5.el5.x86_64"
},
"product_reference": "httpd-manual-0:2.2.10-10.ep5.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.10-10.ep5.el5.i386 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.10-10.ep5.el5.i386"
},
"product_reference": "mod_ssl-1:2.2.10-10.ep5.el5.i386",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.10-10.ep5.el5.x86_64 as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server",
"product_id": "5Server-JBEWS-5.0.0:mod_ssl-1:2.2.10-10.ep5.el5.x86_64"
},
"product_reference": "mod_ssl-1:2.2.10-10.ep5.el5.x86_64",
"relates_to_product_reference": "5Server-JBEWS-5.0.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-1195",
"discovery_date": "2009-03-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "489436"
}
],
"notes": [
{
"category": "description",
"text": "The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: AllowOverride Options=IncludesNoExec allows Options Includes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.src",
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.10-10.ep5.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1195"
},
{
"category": "external",
"summary": "RHBZ#489436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=489436"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1195"
}
],
"release_date": "2009-04-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-14T19:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.src",
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.10-10.ep5.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1155"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.src",
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.10-10.ep5.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: AllowOverride Options=IncludesNoExec allows Options Includes"
},
{
"cve": "CVE-2009-1890",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2009-06-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "509375"
}
],
"notes": [
{
"category": "description",
"text": "The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_proxy reverse proxy DoS (infinite loop)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.src",
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.10-10.ep5.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1890"
},
{
"category": "external",
"summary": "RHBZ#509375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509375"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1890",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1890"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1890",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1890"
}
],
"release_date": "2009-07-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-14T19:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.src",
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.10-10.ep5.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1155"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.src",
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.10-10.ep5.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: mod_proxy reverse proxy DoS (infinite loop)"
},
{
"cve": "CVE-2009-1891",
"discovery_date": "2009-06-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "509125"
}
],
"notes": [
{
"category": "description",
"text": "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: possible temporary DoS (CPU consumption) in mod_deflate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.src",
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.10-10.ep5.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1891"
},
{
"category": "external",
"summary": "RHBZ#509125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891"
}
],
"release_date": "2009-06-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-14T19:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.src",
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.10-10.ep5.el5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1155"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.src",
"5Server-JBEWS-5.0.0:httpd-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-devel-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:httpd-manual-0:2.2.10-10.ep5.el5.x86_64",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.10-10.ep5.el5.i386",
"5Server-JBEWS-5.0.0:mod_ssl-1:2.2.10-10.ep5.el5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: possible temporary DoS (CPU consumption) in mod_deflate"
}
]
}
RHSA-2009:1160
Vulnerability from csaf_redhat - Published: 2009-07-17 13:13 - Updated: 2025-11-21 17:34The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.
The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.
The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated httpd22 packages that fix multiple security issues are now\navailable for JBoss Enterprise Web Server 1.0.0 for Red Hat Enterprise\nLinux 4.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache HTTP Server is a popular Web server. The httpd22 packages\nshipped with JBoss Enterprise Web Server 1.0.0 for Red Hat Enterprise Linux\n4 contain an embedded copy of the Apache Portable Runtime (APR) utility\nlibrary, a free library of C data structures and routines, which includes\ninterfaces to support XML parsing, LDAP connections, database interfaces,\nURI parsing, and more.\n\nA denial of service flaw was found in the Apache mod_proxy module when it\nwas used as a reverse proxy. A remote attacker could use this flaw to force\na proxy process to consume large amounts of CPU time. (CVE-2009-1890)\n\nA denial of service flaw was found in the apr-util Extensible Markup\nLanguage (XML) parser. A remote attacker could create a specially-crafted\nXML document that would cause excessive memory consumption when processed\nby the XML decoding engine. (CVE-2009-1955)\n\nA heap-based underwrite flaw was found in the way apr-util created compiled\nforms of particular search patterns. An attacker could formulate a\nspecially-crafted search keyword, that would overwrite arbitrary heap\nmemory locations when processed by the pattern preparation engine.\n(CVE-2009-0023)\n\nA flaw was found in the handling of the \"Options\" and \"AllowOverride\"\ndirectives used by the Apache HTTP Server. In configurations using the\n\"AllowOverride\" directive with certain \"Options=\" arguments, local users\nwere not restricted from executing commands from a Server-Side-Include\nscript as intended. (CVE-2009-1195)\n\nA denial of service flaw was found in the Apache mod_deflate module. This\nmodule continued to compress large files until compression was complete,\neven if the network connection that requested the content was closed before\ncompression completed. This would cause mod_deflate to consume large\namounts of CPU if mod_deflate was enabled for a large file. (CVE-2009-1891)\n\nAll users of JBoss Enterprise Web Server 1.0.0 should upgrade to these\nupdated packages, which contain backported patches to correct these issues.\nAfter installing the updated packages, the httpd daemon must be restarted\nfor the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1160",
"url": "https://access.redhat.com/errata/RHSA-2009:1160"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "489436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=489436"
},
{
"category": "external",
"summary": "503928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503928"
},
{
"category": "external",
"summary": "504555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504555"
},
{
"category": "external",
"summary": "509125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"category": "external",
"summary": "509375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509375"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1160.json"
}
],
"title": "Red Hat Security Advisory: httpd22 security update",
"tracking": {
"current_release_date": "2025-11-21T17:34:53+00:00",
"generator": {
"date": "2025-11-21T17:34:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1160",
"initial_release_date": "2009-07-17T13:13:00+00:00",
"revision_history": [
{
"date": "2009-07-17T13:13:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-07-17T09:13:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:34:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product": {
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product": {
"name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Web Server"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"product": {
"name": "httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"product_id": "httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-devel@2.2.10-23.1.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"product": {
"name": "httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"product_id": "httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.10-23.1.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"product": {
"name": "httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"product_id": "httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22@2.2.10-23.1.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"product": {
"name": "httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"product_id": "httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr@2.2.10-23.1.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64",
"product": {
"name": "mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64",
"product_id": "mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl22@2.2.10-23.1.ep5.el4?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"product": {
"name": "httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"product_id": "httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr-util-devel@2.2.10-23.1.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"product": {
"name": "httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"product_id": "httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr-devel@2.2.10-23.1.ep5.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"product": {
"name": "httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"product_id": "httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr-util@2.2.10-23.1.ep5.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"product": {
"name": "httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"product_id": "httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-devel@2.2.10-23.1.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"product": {
"name": "httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"product_id": "httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-debuginfo@2.2.10-23.1.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd22-0:2.2.10-23.1.ep5.el4.i386",
"product": {
"name": "httpd22-0:2.2.10-23.1.ep5.el4.i386",
"product_id": "httpd22-0:2.2.10-23.1.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22@2.2.10-23.1.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"product": {
"name": "httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"product_id": "httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr@2.2.10-23.1.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"product": {
"name": "mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"product_id": "mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl22@2.2.10-23.1.ep5.el4?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"product": {
"name": "httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"product_id": "httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr-util-devel@2.2.10-23.1.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"product": {
"name": "httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"product_id": "httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr-devel@2.2.10-23.1.ep5.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"product": {
"name": "httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"product_id": "httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22-apr-util@2.2.10-23.1.ep5.el4?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd22-0:2.2.10-23.1.ep5.el4.src",
"product": {
"name": "httpd22-0:2.2.10-23.1.ep5.el4.src",
"product_id": "httpd22-0:2.2.10-23.1.ep5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd22@2.2.10-23.1.ep5.el4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-0:2.2.10-23.1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386"
},
"product_reference": "httpd22-0:2.2.10-23.1.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-0:2.2.10-23.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src"
},
"product_reference": "httpd22-0:2.2.10-23.1.ep5.el4.src",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-0:2.2.10-23.1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64"
},
"product_reference": "httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-0:2.2.10-23.1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386"
},
"product_reference": "httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386"
},
"product_reference": "httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386"
},
"product_reference": "httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386"
},
"product_reference": "httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386"
},
"product_reference": "httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64"
},
"product_reference": "httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-devel-0:2.2.10-23.1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386"
},
"product_reference": "httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64"
},
"product_reference": "httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl22-1:2.2.10-23.1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386"
},
"product_reference": "mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS",
"product_id": "4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64"
},
"product_reference": "mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64",
"relates_to_product_reference": "4AS-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-0:2.2.10-23.1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386"
},
"product_reference": "httpd22-0:2.2.10-23.1.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-0:2.2.10-23.1.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src"
},
"product_reference": "httpd22-0:2.2.10-23.1.ep5.el4.src",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-0:2.2.10-23.1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64"
},
"product_reference": "httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-0:2.2.10-23.1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386"
},
"product_reference": "httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386"
},
"product_reference": "httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386"
},
"product_reference": "httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386"
},
"product_reference": "httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64"
},
"product_reference": "httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386"
},
"product_reference": "httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64"
},
"product_reference": "httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-devel-0:2.2.10-23.1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386"
},
"product_reference": "httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64"
},
"product_reference": "httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl22-1:2.2.10-23.1.ep5.el4.i386 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386"
},
"product_reference": "mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64 as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES",
"product_id": "4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64"
},
"product_reference": "mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64",
"relates_to_product_reference": "4ES-JBEWS-5.0.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0023",
"discovery_date": "2009-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503928"
}
],
"notes": [
{
"category": "description",
"text": "The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apr-util heap buffer underwrite",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0023"
},
{
"category": "external",
"summary": "RHBZ#503928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0023",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0023"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0023",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0023"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-17T13:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1160"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apr-util heap buffer underwrite"
},
{
"cve": "CVE-2009-1195",
"discovery_date": "2009-03-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "489436"
}
],
"notes": [
{
"category": "description",
"text": "The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: AllowOverride Options=IncludesNoExec allows Options Includes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1195"
},
{
"category": "external",
"summary": "RHBZ#489436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=489436"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1195"
}
],
"release_date": "2009-04-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-17T13:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1160"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: AllowOverride Options=IncludesNoExec allows Options Includes"
},
{
"cve": "CVE-2009-1890",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2009-06-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "509375"
}
],
"notes": [
{
"category": "description",
"text": "The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_proxy reverse proxy DoS (infinite loop)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1890"
},
{
"category": "external",
"summary": "RHBZ#509375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509375"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1890",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1890"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1890",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1890"
}
],
"release_date": "2009-07-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-17T13:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1160"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: mod_proxy reverse proxy DoS (infinite loop)"
},
{
"cve": "CVE-2009-1891",
"discovery_date": "2009-06-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "509125"
}
],
"notes": [
{
"category": "description",
"text": "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: possible temporary DoS (CPU consumption) in mod_deflate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1891"
},
{
"category": "external",
"summary": "RHBZ#509125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891"
}
],
"release_date": "2009-06-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-17T13:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1160"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: possible temporary DoS (CPU consumption) in mod_deflate"
},
{
"cve": "CVE-2009-1955",
"discovery_date": "2009-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504555"
}
],
"notes": [
{
"category": "description",
"text": "The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apr-util billion laughs attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1955"
},
{
"category": "external",
"summary": "RHBZ#504555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504555"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1955",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1955"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1955",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1955"
}
],
"release_date": "2009-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-17T13:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1160"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4AS-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4AS-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.src",
"4ES-JBEWS-5.0.0:httpd22-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-apr-util-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-debuginfo-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:httpd22-devel-0:2.2.10-23.1.ep5.el4.x86_64",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.i386",
"4ES-JBEWS-5.0.0:mod_ssl22-1:2.2.10-23.1.ep5.el4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apr-util billion laughs attack"
}
]
}
RHSA-2009:1205
Vulnerability from csaf_redhat - Published: 2009-08-10 17:34 - Updated: 2025-11-21 17:35The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated httpd packages that fix multiple security issues and a bug are now\navailable for Red Hat Enterprise Linux 3.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache HTTP Server is a popular Web server. The httpd package shipped\nwith Red Hat Enterprise Linux 3 contains embedded copies of the Apache\nPortable Runtime (APR) libraries, which provide a free library of C data\nstructures and routines, and also additional utility interfaces to support\nXML parsing, LDAP, database interfaces, URI parsing, and more.\n\nMultiple integer overflow flaws, leading to heap-based buffer overflows,\nwere found in the way the Apache Portable Runtime (APR) manages memory pool\nand relocatable memory allocations. An attacker could use these flaws to\nissue a specially-crafted request for memory allocation, which would lead\nto a denial of service (application crash) or, potentially, execute\narbitrary code with the privileges of an application using the APR\nlibraries. (CVE-2009-2412)\n\nA denial of service flaw was found in the Apache mod_deflate module. This\nmodule continued to compress large files until compression was complete,\neven if the network connection that requested the content was closed\nbefore compression completed. This would cause mod_deflate to consume\nlarge amounts of CPU if mod_deflate was enabled for a large file.\n(CVE-2009-1891)\n\nThis update also fixes the following bug:\n\n* in some cases the Content-Length header was dropped from HEAD responses.\nThis resulted in certain sites not working correctly with mod_proxy, such\nas www.windowsupdate.com. (BZ#506016)\n\nAll httpd users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, the httpd daemon must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1205",
"url": "https://access.redhat.com/errata/RHSA-2009:1205"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "506016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=506016"
},
{
"category": "external",
"summary": "509125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"category": "external",
"summary": "515698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515698"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1205.json"
}
],
"title": "Red Hat Security Advisory: httpd security and bug fix update",
"tracking": {
"current_release_date": "2025-11-21T17:35:01+00:00",
"generator": {
"date": "2025-11-21T17:35:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1205",
"initial_release_date": "2009-08-10T17:34:00+00:00",
"revision_history": [
{
"date": "2009-08-10T17:34:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-08-10T13:40:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:35:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 3",
"product": {
"name": "Red Hat Enterprise Linux AS version 3",
"product_id": "3AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Desktop version 3",
"product": {
"name": "Red Hat Desktop version 3",
"product_id": "3Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 3",
"product": {
"name": "Red Hat Enterprise Linux ES version 3",
"product_id": "3ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 3",
"product": {
"name": "Red Hat Enterprise Linux WS version 3",
"product_id": "3WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:3::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_ssl-1:2.0.46-75.ent.ia64",
"product": {
"name": "mod_ssl-1:2.0.46-75.ent.ia64",
"product_id": "mod_ssl-1:2.0.46-75.ent.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.0.46-75.ent?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.0.46-75.ent.ia64",
"product": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.ia64",
"product_id": "httpd-debuginfo-0:2.0.46-75.ent.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.0.46-75.ent?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.0.46-75.ent.ia64",
"product": {
"name": "httpd-0:2.0.46-75.ent.ia64",
"product_id": "httpd-0:2.0.46-75.ent.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.46-75.ent?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.0.46-75.ent.ia64",
"product": {
"name": "httpd-devel-0:2.0.46-75.ent.ia64",
"product_id": "httpd-devel-0:2.0.46-75.ent.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.0.46-75.ent?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_ssl-1:2.0.46-75.ent.x86_64",
"product": {
"name": "mod_ssl-1:2.0.46-75.ent.x86_64",
"product_id": "mod_ssl-1:2.0.46-75.ent.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.0.46-75.ent?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"product_id": "httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.0.46-75.ent?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.0.46-75.ent.x86_64",
"product": {
"name": "httpd-0:2.0.46-75.ent.x86_64",
"product_id": "httpd-0:2.0.46-75.ent.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.46-75.ent?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.0.46-75.ent.x86_64",
"product": {
"name": "httpd-devel-0:2.0.46-75.ent.x86_64",
"product_id": "httpd-devel-0:2.0.46-75.ent.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.0.46-75.ent?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_ssl-1:2.0.46-75.ent.i386",
"product": {
"name": "mod_ssl-1:2.0.46-75.ent.i386",
"product_id": "mod_ssl-1:2.0.46-75.ent.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.0.46-75.ent?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.0.46-75.ent.i386",
"product": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.i386",
"product_id": "httpd-debuginfo-0:2.0.46-75.ent.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.0.46-75.ent?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.0.46-75.ent.i386",
"product": {
"name": "httpd-0:2.0.46-75.ent.i386",
"product_id": "httpd-0:2.0.46-75.ent.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.46-75.ent?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.0.46-75.ent.i386",
"product": {
"name": "httpd-devel-0:2.0.46-75.ent.i386",
"product_id": "httpd-devel-0:2.0.46-75.ent.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.0.46-75.ent?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.0.46-75.ent.src",
"product": {
"name": "httpd-0:2.0.46-75.ent.src",
"product_id": "httpd-0:2.0.46-75.ent.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.46-75.ent?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_ssl-1:2.0.46-75.ent.ppc",
"product": {
"name": "mod_ssl-1:2.0.46-75.ent.ppc",
"product_id": "mod_ssl-1:2.0.46-75.ent.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.0.46-75.ent?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.0.46-75.ent.ppc",
"product": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.ppc",
"product_id": "httpd-debuginfo-0:2.0.46-75.ent.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.0.46-75.ent?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.0.46-75.ent.ppc",
"product": {
"name": "httpd-0:2.0.46-75.ent.ppc",
"product_id": "httpd-0:2.0.46-75.ent.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.46-75.ent?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.0.46-75.ent.ppc",
"product": {
"name": "httpd-devel-0:2.0.46-75.ent.ppc",
"product_id": "httpd-devel-0:2.0.46-75.ent.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.0.46-75.ent?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_ssl-1:2.0.46-75.ent.s390x",
"product": {
"name": "mod_ssl-1:2.0.46-75.ent.s390x",
"product_id": "mod_ssl-1:2.0.46-75.ent.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.0.46-75.ent?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.0.46-75.ent.s390x",
"product": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.s390x",
"product_id": "httpd-debuginfo-0:2.0.46-75.ent.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.0.46-75.ent?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.0.46-75.ent.s390x",
"product": {
"name": "httpd-0:2.0.46-75.ent.s390x",
"product_id": "httpd-0:2.0.46-75.ent.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.46-75.ent?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.0.46-75.ent.s390x",
"product": {
"name": "httpd-devel-0:2.0.46-75.ent.s390x",
"product_id": "httpd-devel-0:2.0.46-75.ent.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.0.46-75.ent?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "mod_ssl-1:2.0.46-75.ent.s390",
"product": {
"name": "mod_ssl-1:2.0.46-75.ent.s390",
"product_id": "mod_ssl-1:2.0.46-75.ent.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.0.46-75.ent?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.0.46-75.ent.s390",
"product": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.s390",
"product_id": "httpd-debuginfo-0:2.0.46-75.ent.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.0.46-75.ent?arch=s390"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.0.46-75.ent.s390",
"product": {
"name": "httpd-0:2.0.46-75.ent.s390",
"product_id": "httpd-0:2.0.46-75.ent.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.46-75.ent?arch=s390"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.0.46-75.ent.s390",
"product": {
"name": "httpd-devel-0:2.0.46-75.ent.s390",
"product_id": "httpd-devel-0:2.0.46-75.ent.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.0.46-75.ent?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:httpd-0:2.0.46-75.ent.i386"
},
"product_reference": "httpd-0:2.0.46-75.ent.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:httpd-0:2.0.46-75.ent.ia64"
},
"product_reference": "httpd-0:2.0.46-75.ent.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:httpd-0:2.0.46-75.ent.ppc"
},
"product_reference": "httpd-0:2.0.46-75.ent.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:httpd-0:2.0.46-75.ent.s390"
},
"product_reference": "httpd-0:2.0.46-75.ent.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:httpd-0:2.0.46-75.ent.s390x"
},
"product_reference": "httpd-0:2.0.46-75.ent.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.src as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:httpd-0:2.0.46-75.ent.src"
},
"product_reference": "httpd-0:2.0.46-75.ent.src",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:httpd-0:2.0.46-75.ent.x86_64"
},
"product_reference": "httpd-0:2.0.46-75.ent.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:httpd-debuginfo-0:2.0.46-75.ent.i386"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:httpd-debuginfo-0:2.0.46-75.ent.ia64"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:httpd-debuginfo-0:2.0.46-75.ent.ppc"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:httpd-debuginfo-0:2.0.46-75.ent.s390"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:httpd-debuginfo-0:2.0.46-75.ent.s390x"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:httpd-debuginfo-0:2.0.46-75.ent.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:httpd-devel-0:2.0.46-75.ent.i386"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:httpd-devel-0:2.0.46-75.ent.ia64"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:httpd-devel-0:2.0.46-75.ent.ppc"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:httpd-devel-0:2.0.46-75.ent.s390"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:httpd-devel-0:2.0.46-75.ent.s390x"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:httpd-devel-0:2.0.46-75.ent.x86_64"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.i386 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:mod_ssl-1:2.0.46-75.ent.i386"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.i386",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.ia64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:mod_ssl-1:2.0.46-75.ent.ia64"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.ia64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.ppc as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:mod_ssl-1:2.0.46-75.ent.ppc"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.ppc",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.s390 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:mod_ssl-1:2.0.46-75.ent.s390"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.s390",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.s390x as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:mod_ssl-1:2.0.46-75.ent.s390x"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.s390x",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.x86_64 as a component of Red Hat Enterprise Linux AS version 3",
"product_id": "3AS:mod_ssl-1:2.0.46-75.ent.x86_64"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.x86_64",
"relates_to_product_reference": "3AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:httpd-0:2.0.46-75.ent.i386"
},
"product_reference": "httpd-0:2.0.46-75.ent.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:httpd-0:2.0.46-75.ent.ia64"
},
"product_reference": "httpd-0:2.0.46-75.ent.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:httpd-0:2.0.46-75.ent.ppc"
},
"product_reference": "httpd-0:2.0.46-75.ent.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:httpd-0:2.0.46-75.ent.s390"
},
"product_reference": "httpd-0:2.0.46-75.ent.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:httpd-0:2.0.46-75.ent.s390x"
},
"product_reference": "httpd-0:2.0.46-75.ent.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.src as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:httpd-0:2.0.46-75.ent.src"
},
"product_reference": "httpd-0:2.0.46-75.ent.src",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:httpd-0:2.0.46-75.ent.x86_64"
},
"product_reference": "httpd-0:2.0.46-75.ent.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:httpd-debuginfo-0:2.0.46-75.ent.i386"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:httpd-debuginfo-0:2.0.46-75.ent.ia64"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:httpd-debuginfo-0:2.0.46-75.ent.ppc"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:httpd-debuginfo-0:2.0.46-75.ent.s390"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:httpd-debuginfo-0:2.0.46-75.ent.s390x"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:httpd-debuginfo-0:2.0.46-75.ent.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:httpd-devel-0:2.0.46-75.ent.i386"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:httpd-devel-0:2.0.46-75.ent.ia64"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:httpd-devel-0:2.0.46-75.ent.ppc"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:httpd-devel-0:2.0.46-75.ent.s390"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:httpd-devel-0:2.0.46-75.ent.s390x"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:httpd-devel-0:2.0.46-75.ent.x86_64"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.i386 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:mod_ssl-1:2.0.46-75.ent.i386"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.i386",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.ia64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:mod_ssl-1:2.0.46-75.ent.ia64"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.ia64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.ppc as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:mod_ssl-1:2.0.46-75.ent.ppc"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.ppc",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.s390 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:mod_ssl-1:2.0.46-75.ent.s390"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.s390",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.s390x as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:mod_ssl-1:2.0.46-75.ent.s390x"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.s390x",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.x86_64 as a component of Red Hat Desktop version 3",
"product_id": "3Desktop:mod_ssl-1:2.0.46-75.ent.x86_64"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.x86_64",
"relates_to_product_reference": "3Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:httpd-0:2.0.46-75.ent.i386"
},
"product_reference": "httpd-0:2.0.46-75.ent.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:httpd-0:2.0.46-75.ent.ia64"
},
"product_reference": "httpd-0:2.0.46-75.ent.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:httpd-0:2.0.46-75.ent.ppc"
},
"product_reference": "httpd-0:2.0.46-75.ent.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:httpd-0:2.0.46-75.ent.s390"
},
"product_reference": "httpd-0:2.0.46-75.ent.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:httpd-0:2.0.46-75.ent.s390x"
},
"product_reference": "httpd-0:2.0.46-75.ent.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.src as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:httpd-0:2.0.46-75.ent.src"
},
"product_reference": "httpd-0:2.0.46-75.ent.src",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:httpd-0:2.0.46-75.ent.x86_64"
},
"product_reference": "httpd-0:2.0.46-75.ent.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:httpd-debuginfo-0:2.0.46-75.ent.i386"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:httpd-debuginfo-0:2.0.46-75.ent.ia64"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:httpd-debuginfo-0:2.0.46-75.ent.ppc"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:httpd-debuginfo-0:2.0.46-75.ent.s390"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:httpd-debuginfo-0:2.0.46-75.ent.s390x"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:httpd-debuginfo-0:2.0.46-75.ent.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:httpd-devel-0:2.0.46-75.ent.i386"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:httpd-devel-0:2.0.46-75.ent.ia64"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:httpd-devel-0:2.0.46-75.ent.ppc"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:httpd-devel-0:2.0.46-75.ent.s390"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:httpd-devel-0:2.0.46-75.ent.s390x"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:httpd-devel-0:2.0.46-75.ent.x86_64"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.i386 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:mod_ssl-1:2.0.46-75.ent.i386"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.i386",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.ia64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:mod_ssl-1:2.0.46-75.ent.ia64"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.ia64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.ppc as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:mod_ssl-1:2.0.46-75.ent.ppc"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.ppc",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.s390 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:mod_ssl-1:2.0.46-75.ent.s390"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.s390",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.s390x as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:mod_ssl-1:2.0.46-75.ent.s390x"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.s390x",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.x86_64 as a component of Red Hat Enterprise Linux ES version 3",
"product_id": "3ES:mod_ssl-1:2.0.46-75.ent.x86_64"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.x86_64",
"relates_to_product_reference": "3ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:httpd-0:2.0.46-75.ent.i386"
},
"product_reference": "httpd-0:2.0.46-75.ent.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:httpd-0:2.0.46-75.ent.ia64"
},
"product_reference": "httpd-0:2.0.46-75.ent.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:httpd-0:2.0.46-75.ent.ppc"
},
"product_reference": "httpd-0:2.0.46-75.ent.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:httpd-0:2.0.46-75.ent.s390"
},
"product_reference": "httpd-0:2.0.46-75.ent.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:httpd-0:2.0.46-75.ent.s390x"
},
"product_reference": "httpd-0:2.0.46-75.ent.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.src as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:httpd-0:2.0.46-75.ent.src"
},
"product_reference": "httpd-0:2.0.46-75.ent.src",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.46-75.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:httpd-0:2.0.46-75.ent.x86_64"
},
"product_reference": "httpd-0:2.0.46-75.ent.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:httpd-debuginfo-0:2.0.46-75.ent.i386"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:httpd-debuginfo-0:2.0.46-75.ent.ia64"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:httpd-debuginfo-0:2.0.46-75.ent.ppc"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:httpd-debuginfo-0:2.0.46-75.ent.s390"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:httpd-debuginfo-0:2.0.46-75.ent.s390x"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.46-75.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:httpd-debuginfo-0:2.0.46-75.ent.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:httpd-devel-0:2.0.46-75.ent.i386"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:httpd-devel-0:2.0.46-75.ent.ia64"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:httpd-devel-0:2.0.46-75.ent.ppc"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:httpd-devel-0:2.0.46-75.ent.s390"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:httpd-devel-0:2.0.46-75.ent.s390x"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.46-75.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:httpd-devel-0:2.0.46-75.ent.x86_64"
},
"product_reference": "httpd-devel-0:2.0.46-75.ent.x86_64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.i386 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:mod_ssl-1:2.0.46-75.ent.i386"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.i386",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.ia64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:mod_ssl-1:2.0.46-75.ent.ia64"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.ia64",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.ppc as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:mod_ssl-1:2.0.46-75.ent.ppc"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.ppc",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.s390 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:mod_ssl-1:2.0.46-75.ent.s390"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.s390",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.s390x as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:mod_ssl-1:2.0.46-75.ent.s390x"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.s390x",
"relates_to_product_reference": "3WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.46-75.ent.x86_64 as a component of Red Hat Enterprise Linux WS version 3",
"product_id": "3WS:mod_ssl-1:2.0.46-75.ent.x86_64"
},
"product_reference": "mod_ssl-1:2.0.46-75.ent.x86_64",
"relates_to_product_reference": "3WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-1891",
"discovery_date": "2009-06-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "509125"
}
],
"notes": [
{
"category": "description",
"text": "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: possible temporary DoS (CPU consumption) in mod_deflate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS:httpd-0:2.0.46-75.ent.i386",
"3AS:httpd-0:2.0.46-75.ent.ia64",
"3AS:httpd-0:2.0.46-75.ent.ppc",
"3AS:httpd-0:2.0.46-75.ent.s390",
"3AS:httpd-0:2.0.46-75.ent.s390x",
"3AS:httpd-0:2.0.46-75.ent.src",
"3AS:httpd-0:2.0.46-75.ent.x86_64",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3AS:httpd-devel-0:2.0.46-75.ent.i386",
"3AS:httpd-devel-0:2.0.46-75.ent.ia64",
"3AS:httpd-devel-0:2.0.46-75.ent.ppc",
"3AS:httpd-devel-0:2.0.46-75.ent.s390",
"3AS:httpd-devel-0:2.0.46-75.ent.s390x",
"3AS:httpd-devel-0:2.0.46-75.ent.x86_64",
"3AS:mod_ssl-1:2.0.46-75.ent.i386",
"3AS:mod_ssl-1:2.0.46-75.ent.ia64",
"3AS:mod_ssl-1:2.0.46-75.ent.ppc",
"3AS:mod_ssl-1:2.0.46-75.ent.s390",
"3AS:mod_ssl-1:2.0.46-75.ent.s390x",
"3AS:mod_ssl-1:2.0.46-75.ent.x86_64",
"3Desktop:httpd-0:2.0.46-75.ent.i386",
"3Desktop:httpd-0:2.0.46-75.ent.ia64",
"3Desktop:httpd-0:2.0.46-75.ent.ppc",
"3Desktop:httpd-0:2.0.46-75.ent.s390",
"3Desktop:httpd-0:2.0.46-75.ent.s390x",
"3Desktop:httpd-0:2.0.46-75.ent.src",
"3Desktop:httpd-0:2.0.46-75.ent.x86_64",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3Desktop:httpd-devel-0:2.0.46-75.ent.i386",
"3Desktop:httpd-devel-0:2.0.46-75.ent.ia64",
"3Desktop:httpd-devel-0:2.0.46-75.ent.ppc",
"3Desktop:httpd-devel-0:2.0.46-75.ent.s390",
"3Desktop:httpd-devel-0:2.0.46-75.ent.s390x",
"3Desktop:httpd-devel-0:2.0.46-75.ent.x86_64",
"3Desktop:mod_ssl-1:2.0.46-75.ent.i386",
"3Desktop:mod_ssl-1:2.0.46-75.ent.ia64",
"3Desktop:mod_ssl-1:2.0.46-75.ent.ppc",
"3Desktop:mod_ssl-1:2.0.46-75.ent.s390",
"3Desktop:mod_ssl-1:2.0.46-75.ent.s390x",
"3Desktop:mod_ssl-1:2.0.46-75.ent.x86_64",
"3ES:httpd-0:2.0.46-75.ent.i386",
"3ES:httpd-0:2.0.46-75.ent.ia64",
"3ES:httpd-0:2.0.46-75.ent.ppc",
"3ES:httpd-0:2.0.46-75.ent.s390",
"3ES:httpd-0:2.0.46-75.ent.s390x",
"3ES:httpd-0:2.0.46-75.ent.src",
"3ES:httpd-0:2.0.46-75.ent.x86_64",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3ES:httpd-devel-0:2.0.46-75.ent.i386",
"3ES:httpd-devel-0:2.0.46-75.ent.ia64",
"3ES:httpd-devel-0:2.0.46-75.ent.ppc",
"3ES:httpd-devel-0:2.0.46-75.ent.s390",
"3ES:httpd-devel-0:2.0.46-75.ent.s390x",
"3ES:httpd-devel-0:2.0.46-75.ent.x86_64",
"3ES:mod_ssl-1:2.0.46-75.ent.i386",
"3ES:mod_ssl-1:2.0.46-75.ent.ia64",
"3ES:mod_ssl-1:2.0.46-75.ent.ppc",
"3ES:mod_ssl-1:2.0.46-75.ent.s390",
"3ES:mod_ssl-1:2.0.46-75.ent.s390x",
"3ES:mod_ssl-1:2.0.46-75.ent.x86_64",
"3WS:httpd-0:2.0.46-75.ent.i386",
"3WS:httpd-0:2.0.46-75.ent.ia64",
"3WS:httpd-0:2.0.46-75.ent.ppc",
"3WS:httpd-0:2.0.46-75.ent.s390",
"3WS:httpd-0:2.0.46-75.ent.s390x",
"3WS:httpd-0:2.0.46-75.ent.src",
"3WS:httpd-0:2.0.46-75.ent.x86_64",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3WS:httpd-devel-0:2.0.46-75.ent.i386",
"3WS:httpd-devel-0:2.0.46-75.ent.ia64",
"3WS:httpd-devel-0:2.0.46-75.ent.ppc",
"3WS:httpd-devel-0:2.0.46-75.ent.s390",
"3WS:httpd-devel-0:2.0.46-75.ent.s390x",
"3WS:httpd-devel-0:2.0.46-75.ent.x86_64",
"3WS:mod_ssl-1:2.0.46-75.ent.i386",
"3WS:mod_ssl-1:2.0.46-75.ent.ia64",
"3WS:mod_ssl-1:2.0.46-75.ent.ppc",
"3WS:mod_ssl-1:2.0.46-75.ent.s390",
"3WS:mod_ssl-1:2.0.46-75.ent.s390x",
"3WS:mod_ssl-1:2.0.46-75.ent.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1891"
},
{
"category": "external",
"summary": "RHBZ#509125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891"
}
],
"release_date": "2009-06-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-10T17:34:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"3AS:httpd-0:2.0.46-75.ent.i386",
"3AS:httpd-0:2.0.46-75.ent.ia64",
"3AS:httpd-0:2.0.46-75.ent.ppc",
"3AS:httpd-0:2.0.46-75.ent.s390",
"3AS:httpd-0:2.0.46-75.ent.s390x",
"3AS:httpd-0:2.0.46-75.ent.src",
"3AS:httpd-0:2.0.46-75.ent.x86_64",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3AS:httpd-devel-0:2.0.46-75.ent.i386",
"3AS:httpd-devel-0:2.0.46-75.ent.ia64",
"3AS:httpd-devel-0:2.0.46-75.ent.ppc",
"3AS:httpd-devel-0:2.0.46-75.ent.s390",
"3AS:httpd-devel-0:2.0.46-75.ent.s390x",
"3AS:httpd-devel-0:2.0.46-75.ent.x86_64",
"3AS:mod_ssl-1:2.0.46-75.ent.i386",
"3AS:mod_ssl-1:2.0.46-75.ent.ia64",
"3AS:mod_ssl-1:2.0.46-75.ent.ppc",
"3AS:mod_ssl-1:2.0.46-75.ent.s390",
"3AS:mod_ssl-1:2.0.46-75.ent.s390x",
"3AS:mod_ssl-1:2.0.46-75.ent.x86_64",
"3Desktop:httpd-0:2.0.46-75.ent.i386",
"3Desktop:httpd-0:2.0.46-75.ent.ia64",
"3Desktop:httpd-0:2.0.46-75.ent.ppc",
"3Desktop:httpd-0:2.0.46-75.ent.s390",
"3Desktop:httpd-0:2.0.46-75.ent.s390x",
"3Desktop:httpd-0:2.0.46-75.ent.src",
"3Desktop:httpd-0:2.0.46-75.ent.x86_64",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3Desktop:httpd-devel-0:2.0.46-75.ent.i386",
"3Desktop:httpd-devel-0:2.0.46-75.ent.ia64",
"3Desktop:httpd-devel-0:2.0.46-75.ent.ppc",
"3Desktop:httpd-devel-0:2.0.46-75.ent.s390",
"3Desktop:httpd-devel-0:2.0.46-75.ent.s390x",
"3Desktop:httpd-devel-0:2.0.46-75.ent.x86_64",
"3Desktop:mod_ssl-1:2.0.46-75.ent.i386",
"3Desktop:mod_ssl-1:2.0.46-75.ent.ia64",
"3Desktop:mod_ssl-1:2.0.46-75.ent.ppc",
"3Desktop:mod_ssl-1:2.0.46-75.ent.s390",
"3Desktop:mod_ssl-1:2.0.46-75.ent.s390x",
"3Desktop:mod_ssl-1:2.0.46-75.ent.x86_64",
"3ES:httpd-0:2.0.46-75.ent.i386",
"3ES:httpd-0:2.0.46-75.ent.ia64",
"3ES:httpd-0:2.0.46-75.ent.ppc",
"3ES:httpd-0:2.0.46-75.ent.s390",
"3ES:httpd-0:2.0.46-75.ent.s390x",
"3ES:httpd-0:2.0.46-75.ent.src",
"3ES:httpd-0:2.0.46-75.ent.x86_64",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3ES:httpd-devel-0:2.0.46-75.ent.i386",
"3ES:httpd-devel-0:2.0.46-75.ent.ia64",
"3ES:httpd-devel-0:2.0.46-75.ent.ppc",
"3ES:httpd-devel-0:2.0.46-75.ent.s390",
"3ES:httpd-devel-0:2.0.46-75.ent.s390x",
"3ES:httpd-devel-0:2.0.46-75.ent.x86_64",
"3ES:mod_ssl-1:2.0.46-75.ent.i386",
"3ES:mod_ssl-1:2.0.46-75.ent.ia64",
"3ES:mod_ssl-1:2.0.46-75.ent.ppc",
"3ES:mod_ssl-1:2.0.46-75.ent.s390",
"3ES:mod_ssl-1:2.0.46-75.ent.s390x",
"3ES:mod_ssl-1:2.0.46-75.ent.x86_64",
"3WS:httpd-0:2.0.46-75.ent.i386",
"3WS:httpd-0:2.0.46-75.ent.ia64",
"3WS:httpd-0:2.0.46-75.ent.ppc",
"3WS:httpd-0:2.0.46-75.ent.s390",
"3WS:httpd-0:2.0.46-75.ent.s390x",
"3WS:httpd-0:2.0.46-75.ent.src",
"3WS:httpd-0:2.0.46-75.ent.x86_64",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3WS:httpd-devel-0:2.0.46-75.ent.i386",
"3WS:httpd-devel-0:2.0.46-75.ent.ia64",
"3WS:httpd-devel-0:2.0.46-75.ent.ppc",
"3WS:httpd-devel-0:2.0.46-75.ent.s390",
"3WS:httpd-devel-0:2.0.46-75.ent.s390x",
"3WS:httpd-devel-0:2.0.46-75.ent.x86_64",
"3WS:mod_ssl-1:2.0.46-75.ent.i386",
"3WS:mod_ssl-1:2.0.46-75.ent.ia64",
"3WS:mod_ssl-1:2.0.46-75.ent.ppc",
"3WS:mod_ssl-1:2.0.46-75.ent.s390",
"3WS:mod_ssl-1:2.0.46-75.ent.s390x",
"3WS:mod_ssl-1:2.0.46-75.ent.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1205"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"3AS:httpd-0:2.0.46-75.ent.i386",
"3AS:httpd-0:2.0.46-75.ent.ia64",
"3AS:httpd-0:2.0.46-75.ent.ppc",
"3AS:httpd-0:2.0.46-75.ent.s390",
"3AS:httpd-0:2.0.46-75.ent.s390x",
"3AS:httpd-0:2.0.46-75.ent.src",
"3AS:httpd-0:2.0.46-75.ent.x86_64",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3AS:httpd-devel-0:2.0.46-75.ent.i386",
"3AS:httpd-devel-0:2.0.46-75.ent.ia64",
"3AS:httpd-devel-0:2.0.46-75.ent.ppc",
"3AS:httpd-devel-0:2.0.46-75.ent.s390",
"3AS:httpd-devel-0:2.0.46-75.ent.s390x",
"3AS:httpd-devel-0:2.0.46-75.ent.x86_64",
"3AS:mod_ssl-1:2.0.46-75.ent.i386",
"3AS:mod_ssl-1:2.0.46-75.ent.ia64",
"3AS:mod_ssl-1:2.0.46-75.ent.ppc",
"3AS:mod_ssl-1:2.0.46-75.ent.s390",
"3AS:mod_ssl-1:2.0.46-75.ent.s390x",
"3AS:mod_ssl-1:2.0.46-75.ent.x86_64",
"3Desktop:httpd-0:2.0.46-75.ent.i386",
"3Desktop:httpd-0:2.0.46-75.ent.ia64",
"3Desktop:httpd-0:2.0.46-75.ent.ppc",
"3Desktop:httpd-0:2.0.46-75.ent.s390",
"3Desktop:httpd-0:2.0.46-75.ent.s390x",
"3Desktop:httpd-0:2.0.46-75.ent.src",
"3Desktop:httpd-0:2.0.46-75.ent.x86_64",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3Desktop:httpd-devel-0:2.0.46-75.ent.i386",
"3Desktop:httpd-devel-0:2.0.46-75.ent.ia64",
"3Desktop:httpd-devel-0:2.0.46-75.ent.ppc",
"3Desktop:httpd-devel-0:2.0.46-75.ent.s390",
"3Desktop:httpd-devel-0:2.0.46-75.ent.s390x",
"3Desktop:httpd-devel-0:2.0.46-75.ent.x86_64",
"3Desktop:mod_ssl-1:2.0.46-75.ent.i386",
"3Desktop:mod_ssl-1:2.0.46-75.ent.ia64",
"3Desktop:mod_ssl-1:2.0.46-75.ent.ppc",
"3Desktop:mod_ssl-1:2.0.46-75.ent.s390",
"3Desktop:mod_ssl-1:2.0.46-75.ent.s390x",
"3Desktop:mod_ssl-1:2.0.46-75.ent.x86_64",
"3ES:httpd-0:2.0.46-75.ent.i386",
"3ES:httpd-0:2.0.46-75.ent.ia64",
"3ES:httpd-0:2.0.46-75.ent.ppc",
"3ES:httpd-0:2.0.46-75.ent.s390",
"3ES:httpd-0:2.0.46-75.ent.s390x",
"3ES:httpd-0:2.0.46-75.ent.src",
"3ES:httpd-0:2.0.46-75.ent.x86_64",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3ES:httpd-devel-0:2.0.46-75.ent.i386",
"3ES:httpd-devel-0:2.0.46-75.ent.ia64",
"3ES:httpd-devel-0:2.0.46-75.ent.ppc",
"3ES:httpd-devel-0:2.0.46-75.ent.s390",
"3ES:httpd-devel-0:2.0.46-75.ent.s390x",
"3ES:httpd-devel-0:2.0.46-75.ent.x86_64",
"3ES:mod_ssl-1:2.0.46-75.ent.i386",
"3ES:mod_ssl-1:2.0.46-75.ent.ia64",
"3ES:mod_ssl-1:2.0.46-75.ent.ppc",
"3ES:mod_ssl-1:2.0.46-75.ent.s390",
"3ES:mod_ssl-1:2.0.46-75.ent.s390x",
"3ES:mod_ssl-1:2.0.46-75.ent.x86_64",
"3WS:httpd-0:2.0.46-75.ent.i386",
"3WS:httpd-0:2.0.46-75.ent.ia64",
"3WS:httpd-0:2.0.46-75.ent.ppc",
"3WS:httpd-0:2.0.46-75.ent.s390",
"3WS:httpd-0:2.0.46-75.ent.s390x",
"3WS:httpd-0:2.0.46-75.ent.src",
"3WS:httpd-0:2.0.46-75.ent.x86_64",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3WS:httpd-devel-0:2.0.46-75.ent.i386",
"3WS:httpd-devel-0:2.0.46-75.ent.ia64",
"3WS:httpd-devel-0:2.0.46-75.ent.ppc",
"3WS:httpd-devel-0:2.0.46-75.ent.s390",
"3WS:httpd-devel-0:2.0.46-75.ent.s390x",
"3WS:httpd-devel-0:2.0.46-75.ent.x86_64",
"3WS:mod_ssl-1:2.0.46-75.ent.i386",
"3WS:mod_ssl-1:2.0.46-75.ent.ia64",
"3WS:mod_ssl-1:2.0.46-75.ent.ppc",
"3WS:mod_ssl-1:2.0.46-75.ent.s390",
"3WS:mod_ssl-1:2.0.46-75.ent.s390x",
"3WS:mod_ssl-1:2.0.46-75.ent.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: possible temporary DoS (CPU consumption) in mod_deflate"
},
{
"cve": "CVE-2009-2412",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "515698"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apr-util: Integer overflows in memory pool (apr) and relocatable memory (apr-util) management",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"3AS:httpd-0:2.0.46-75.ent.i386",
"3AS:httpd-0:2.0.46-75.ent.ia64",
"3AS:httpd-0:2.0.46-75.ent.ppc",
"3AS:httpd-0:2.0.46-75.ent.s390",
"3AS:httpd-0:2.0.46-75.ent.s390x",
"3AS:httpd-0:2.0.46-75.ent.src",
"3AS:httpd-0:2.0.46-75.ent.x86_64",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3AS:httpd-devel-0:2.0.46-75.ent.i386",
"3AS:httpd-devel-0:2.0.46-75.ent.ia64",
"3AS:httpd-devel-0:2.0.46-75.ent.ppc",
"3AS:httpd-devel-0:2.0.46-75.ent.s390",
"3AS:httpd-devel-0:2.0.46-75.ent.s390x",
"3AS:httpd-devel-0:2.0.46-75.ent.x86_64",
"3AS:mod_ssl-1:2.0.46-75.ent.i386",
"3AS:mod_ssl-1:2.0.46-75.ent.ia64",
"3AS:mod_ssl-1:2.0.46-75.ent.ppc",
"3AS:mod_ssl-1:2.0.46-75.ent.s390",
"3AS:mod_ssl-1:2.0.46-75.ent.s390x",
"3AS:mod_ssl-1:2.0.46-75.ent.x86_64",
"3Desktop:httpd-0:2.0.46-75.ent.i386",
"3Desktop:httpd-0:2.0.46-75.ent.ia64",
"3Desktop:httpd-0:2.0.46-75.ent.ppc",
"3Desktop:httpd-0:2.0.46-75.ent.s390",
"3Desktop:httpd-0:2.0.46-75.ent.s390x",
"3Desktop:httpd-0:2.0.46-75.ent.src",
"3Desktop:httpd-0:2.0.46-75.ent.x86_64",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3Desktop:httpd-devel-0:2.0.46-75.ent.i386",
"3Desktop:httpd-devel-0:2.0.46-75.ent.ia64",
"3Desktop:httpd-devel-0:2.0.46-75.ent.ppc",
"3Desktop:httpd-devel-0:2.0.46-75.ent.s390",
"3Desktop:httpd-devel-0:2.0.46-75.ent.s390x",
"3Desktop:httpd-devel-0:2.0.46-75.ent.x86_64",
"3Desktop:mod_ssl-1:2.0.46-75.ent.i386",
"3Desktop:mod_ssl-1:2.0.46-75.ent.ia64",
"3Desktop:mod_ssl-1:2.0.46-75.ent.ppc",
"3Desktop:mod_ssl-1:2.0.46-75.ent.s390",
"3Desktop:mod_ssl-1:2.0.46-75.ent.s390x",
"3Desktop:mod_ssl-1:2.0.46-75.ent.x86_64",
"3ES:httpd-0:2.0.46-75.ent.i386",
"3ES:httpd-0:2.0.46-75.ent.ia64",
"3ES:httpd-0:2.0.46-75.ent.ppc",
"3ES:httpd-0:2.0.46-75.ent.s390",
"3ES:httpd-0:2.0.46-75.ent.s390x",
"3ES:httpd-0:2.0.46-75.ent.src",
"3ES:httpd-0:2.0.46-75.ent.x86_64",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3ES:httpd-devel-0:2.0.46-75.ent.i386",
"3ES:httpd-devel-0:2.0.46-75.ent.ia64",
"3ES:httpd-devel-0:2.0.46-75.ent.ppc",
"3ES:httpd-devel-0:2.0.46-75.ent.s390",
"3ES:httpd-devel-0:2.0.46-75.ent.s390x",
"3ES:httpd-devel-0:2.0.46-75.ent.x86_64",
"3ES:mod_ssl-1:2.0.46-75.ent.i386",
"3ES:mod_ssl-1:2.0.46-75.ent.ia64",
"3ES:mod_ssl-1:2.0.46-75.ent.ppc",
"3ES:mod_ssl-1:2.0.46-75.ent.s390",
"3ES:mod_ssl-1:2.0.46-75.ent.s390x",
"3ES:mod_ssl-1:2.0.46-75.ent.x86_64",
"3WS:httpd-0:2.0.46-75.ent.i386",
"3WS:httpd-0:2.0.46-75.ent.ia64",
"3WS:httpd-0:2.0.46-75.ent.ppc",
"3WS:httpd-0:2.0.46-75.ent.s390",
"3WS:httpd-0:2.0.46-75.ent.s390x",
"3WS:httpd-0:2.0.46-75.ent.src",
"3WS:httpd-0:2.0.46-75.ent.x86_64",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3WS:httpd-devel-0:2.0.46-75.ent.i386",
"3WS:httpd-devel-0:2.0.46-75.ent.ia64",
"3WS:httpd-devel-0:2.0.46-75.ent.ppc",
"3WS:httpd-devel-0:2.0.46-75.ent.s390",
"3WS:httpd-devel-0:2.0.46-75.ent.s390x",
"3WS:httpd-devel-0:2.0.46-75.ent.x86_64",
"3WS:mod_ssl-1:2.0.46-75.ent.i386",
"3WS:mod_ssl-1:2.0.46-75.ent.ia64",
"3WS:mod_ssl-1:2.0.46-75.ent.ppc",
"3WS:mod_ssl-1:2.0.46-75.ent.s390",
"3WS:mod_ssl-1:2.0.46-75.ent.s390x",
"3WS:mod_ssl-1:2.0.46-75.ent.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2412"
},
{
"category": "external",
"summary": "RHBZ#515698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2412"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2412",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2412"
}
],
"release_date": "2009-08-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-08-10T17:34:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"3AS:httpd-0:2.0.46-75.ent.i386",
"3AS:httpd-0:2.0.46-75.ent.ia64",
"3AS:httpd-0:2.0.46-75.ent.ppc",
"3AS:httpd-0:2.0.46-75.ent.s390",
"3AS:httpd-0:2.0.46-75.ent.s390x",
"3AS:httpd-0:2.0.46-75.ent.src",
"3AS:httpd-0:2.0.46-75.ent.x86_64",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3AS:httpd-devel-0:2.0.46-75.ent.i386",
"3AS:httpd-devel-0:2.0.46-75.ent.ia64",
"3AS:httpd-devel-0:2.0.46-75.ent.ppc",
"3AS:httpd-devel-0:2.0.46-75.ent.s390",
"3AS:httpd-devel-0:2.0.46-75.ent.s390x",
"3AS:httpd-devel-0:2.0.46-75.ent.x86_64",
"3AS:mod_ssl-1:2.0.46-75.ent.i386",
"3AS:mod_ssl-1:2.0.46-75.ent.ia64",
"3AS:mod_ssl-1:2.0.46-75.ent.ppc",
"3AS:mod_ssl-1:2.0.46-75.ent.s390",
"3AS:mod_ssl-1:2.0.46-75.ent.s390x",
"3AS:mod_ssl-1:2.0.46-75.ent.x86_64",
"3Desktop:httpd-0:2.0.46-75.ent.i386",
"3Desktop:httpd-0:2.0.46-75.ent.ia64",
"3Desktop:httpd-0:2.0.46-75.ent.ppc",
"3Desktop:httpd-0:2.0.46-75.ent.s390",
"3Desktop:httpd-0:2.0.46-75.ent.s390x",
"3Desktop:httpd-0:2.0.46-75.ent.src",
"3Desktop:httpd-0:2.0.46-75.ent.x86_64",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3Desktop:httpd-devel-0:2.0.46-75.ent.i386",
"3Desktop:httpd-devel-0:2.0.46-75.ent.ia64",
"3Desktop:httpd-devel-0:2.0.46-75.ent.ppc",
"3Desktop:httpd-devel-0:2.0.46-75.ent.s390",
"3Desktop:httpd-devel-0:2.0.46-75.ent.s390x",
"3Desktop:httpd-devel-0:2.0.46-75.ent.x86_64",
"3Desktop:mod_ssl-1:2.0.46-75.ent.i386",
"3Desktop:mod_ssl-1:2.0.46-75.ent.ia64",
"3Desktop:mod_ssl-1:2.0.46-75.ent.ppc",
"3Desktop:mod_ssl-1:2.0.46-75.ent.s390",
"3Desktop:mod_ssl-1:2.0.46-75.ent.s390x",
"3Desktop:mod_ssl-1:2.0.46-75.ent.x86_64",
"3ES:httpd-0:2.0.46-75.ent.i386",
"3ES:httpd-0:2.0.46-75.ent.ia64",
"3ES:httpd-0:2.0.46-75.ent.ppc",
"3ES:httpd-0:2.0.46-75.ent.s390",
"3ES:httpd-0:2.0.46-75.ent.s390x",
"3ES:httpd-0:2.0.46-75.ent.src",
"3ES:httpd-0:2.0.46-75.ent.x86_64",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3ES:httpd-devel-0:2.0.46-75.ent.i386",
"3ES:httpd-devel-0:2.0.46-75.ent.ia64",
"3ES:httpd-devel-0:2.0.46-75.ent.ppc",
"3ES:httpd-devel-0:2.0.46-75.ent.s390",
"3ES:httpd-devel-0:2.0.46-75.ent.s390x",
"3ES:httpd-devel-0:2.0.46-75.ent.x86_64",
"3ES:mod_ssl-1:2.0.46-75.ent.i386",
"3ES:mod_ssl-1:2.0.46-75.ent.ia64",
"3ES:mod_ssl-1:2.0.46-75.ent.ppc",
"3ES:mod_ssl-1:2.0.46-75.ent.s390",
"3ES:mod_ssl-1:2.0.46-75.ent.s390x",
"3ES:mod_ssl-1:2.0.46-75.ent.x86_64",
"3WS:httpd-0:2.0.46-75.ent.i386",
"3WS:httpd-0:2.0.46-75.ent.ia64",
"3WS:httpd-0:2.0.46-75.ent.ppc",
"3WS:httpd-0:2.0.46-75.ent.s390",
"3WS:httpd-0:2.0.46-75.ent.s390x",
"3WS:httpd-0:2.0.46-75.ent.src",
"3WS:httpd-0:2.0.46-75.ent.x86_64",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3WS:httpd-devel-0:2.0.46-75.ent.i386",
"3WS:httpd-devel-0:2.0.46-75.ent.ia64",
"3WS:httpd-devel-0:2.0.46-75.ent.ppc",
"3WS:httpd-devel-0:2.0.46-75.ent.s390",
"3WS:httpd-devel-0:2.0.46-75.ent.s390x",
"3WS:httpd-devel-0:2.0.46-75.ent.x86_64",
"3WS:mod_ssl-1:2.0.46-75.ent.i386",
"3WS:mod_ssl-1:2.0.46-75.ent.ia64",
"3WS:mod_ssl-1:2.0.46-75.ent.ppc",
"3WS:mod_ssl-1:2.0.46-75.ent.s390",
"3WS:mod_ssl-1:2.0.46-75.ent.s390x",
"3WS:mod_ssl-1:2.0.46-75.ent.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1205"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"3AS:httpd-0:2.0.46-75.ent.i386",
"3AS:httpd-0:2.0.46-75.ent.ia64",
"3AS:httpd-0:2.0.46-75.ent.ppc",
"3AS:httpd-0:2.0.46-75.ent.s390",
"3AS:httpd-0:2.0.46-75.ent.s390x",
"3AS:httpd-0:2.0.46-75.ent.src",
"3AS:httpd-0:2.0.46-75.ent.x86_64",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3AS:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3AS:httpd-devel-0:2.0.46-75.ent.i386",
"3AS:httpd-devel-0:2.0.46-75.ent.ia64",
"3AS:httpd-devel-0:2.0.46-75.ent.ppc",
"3AS:httpd-devel-0:2.0.46-75.ent.s390",
"3AS:httpd-devel-0:2.0.46-75.ent.s390x",
"3AS:httpd-devel-0:2.0.46-75.ent.x86_64",
"3AS:mod_ssl-1:2.0.46-75.ent.i386",
"3AS:mod_ssl-1:2.0.46-75.ent.ia64",
"3AS:mod_ssl-1:2.0.46-75.ent.ppc",
"3AS:mod_ssl-1:2.0.46-75.ent.s390",
"3AS:mod_ssl-1:2.0.46-75.ent.s390x",
"3AS:mod_ssl-1:2.0.46-75.ent.x86_64",
"3Desktop:httpd-0:2.0.46-75.ent.i386",
"3Desktop:httpd-0:2.0.46-75.ent.ia64",
"3Desktop:httpd-0:2.0.46-75.ent.ppc",
"3Desktop:httpd-0:2.0.46-75.ent.s390",
"3Desktop:httpd-0:2.0.46-75.ent.s390x",
"3Desktop:httpd-0:2.0.46-75.ent.src",
"3Desktop:httpd-0:2.0.46-75.ent.x86_64",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3Desktop:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3Desktop:httpd-devel-0:2.0.46-75.ent.i386",
"3Desktop:httpd-devel-0:2.0.46-75.ent.ia64",
"3Desktop:httpd-devel-0:2.0.46-75.ent.ppc",
"3Desktop:httpd-devel-0:2.0.46-75.ent.s390",
"3Desktop:httpd-devel-0:2.0.46-75.ent.s390x",
"3Desktop:httpd-devel-0:2.0.46-75.ent.x86_64",
"3Desktop:mod_ssl-1:2.0.46-75.ent.i386",
"3Desktop:mod_ssl-1:2.0.46-75.ent.ia64",
"3Desktop:mod_ssl-1:2.0.46-75.ent.ppc",
"3Desktop:mod_ssl-1:2.0.46-75.ent.s390",
"3Desktop:mod_ssl-1:2.0.46-75.ent.s390x",
"3Desktop:mod_ssl-1:2.0.46-75.ent.x86_64",
"3ES:httpd-0:2.0.46-75.ent.i386",
"3ES:httpd-0:2.0.46-75.ent.ia64",
"3ES:httpd-0:2.0.46-75.ent.ppc",
"3ES:httpd-0:2.0.46-75.ent.s390",
"3ES:httpd-0:2.0.46-75.ent.s390x",
"3ES:httpd-0:2.0.46-75.ent.src",
"3ES:httpd-0:2.0.46-75.ent.x86_64",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3ES:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3ES:httpd-devel-0:2.0.46-75.ent.i386",
"3ES:httpd-devel-0:2.0.46-75.ent.ia64",
"3ES:httpd-devel-0:2.0.46-75.ent.ppc",
"3ES:httpd-devel-0:2.0.46-75.ent.s390",
"3ES:httpd-devel-0:2.0.46-75.ent.s390x",
"3ES:httpd-devel-0:2.0.46-75.ent.x86_64",
"3ES:mod_ssl-1:2.0.46-75.ent.i386",
"3ES:mod_ssl-1:2.0.46-75.ent.ia64",
"3ES:mod_ssl-1:2.0.46-75.ent.ppc",
"3ES:mod_ssl-1:2.0.46-75.ent.s390",
"3ES:mod_ssl-1:2.0.46-75.ent.s390x",
"3ES:mod_ssl-1:2.0.46-75.ent.x86_64",
"3WS:httpd-0:2.0.46-75.ent.i386",
"3WS:httpd-0:2.0.46-75.ent.ia64",
"3WS:httpd-0:2.0.46-75.ent.ppc",
"3WS:httpd-0:2.0.46-75.ent.s390",
"3WS:httpd-0:2.0.46-75.ent.s390x",
"3WS:httpd-0:2.0.46-75.ent.src",
"3WS:httpd-0:2.0.46-75.ent.x86_64",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.i386",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.ia64",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.ppc",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.s390",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.s390x",
"3WS:httpd-debuginfo-0:2.0.46-75.ent.x86_64",
"3WS:httpd-devel-0:2.0.46-75.ent.i386",
"3WS:httpd-devel-0:2.0.46-75.ent.ia64",
"3WS:httpd-devel-0:2.0.46-75.ent.ppc",
"3WS:httpd-devel-0:2.0.46-75.ent.s390",
"3WS:httpd-devel-0:2.0.46-75.ent.s390x",
"3WS:httpd-devel-0:2.0.46-75.ent.x86_64",
"3WS:mod_ssl-1:2.0.46-75.ent.i386",
"3WS:mod_ssl-1:2.0.46-75.ent.ia64",
"3WS:mod_ssl-1:2.0.46-75.ent.ppc",
"3WS:mod_ssl-1:2.0.46-75.ent.s390",
"3WS:mod_ssl-1:2.0.46-75.ent.s390x",
"3WS:mod_ssl-1:2.0.46-75.ent.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apr-util: Integer overflows in memory pool (apr) and relocatable memory (apr-util) management"
}
]
}
RHSA-2009:1148
Vulnerability from csaf_redhat - Published: 2009-07-09 16:10 - Updated: 2025-11-21 17:34The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
| URL | Category | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated httpd packages that fix two security issues are now available for\nRed Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache HTTP Server is a popular Web server.\n\nA denial of service flaw was found in the Apache mod_proxy module when it\nwas used as a reverse proxy. A remote attacker could use this flaw to force\na proxy process to consume large amounts of CPU time. (CVE-2009-1890)\n\nA denial of service flaw was found in the Apache mod_deflate module. This\nmodule continued to compress large files until compression was complete,\neven if the network connection that requested the content was closed before\ncompression completed. This would cause mod_deflate to consume large\namounts of CPU if mod_deflate was enabled for a large file. (CVE-2009-1891)\n\nAll httpd users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, the httpd daemon must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1148",
"url": "https://access.redhat.com/errata/RHSA-2009:1148"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "509125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"category": "external",
"summary": "509375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509375"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1148.json"
}
],
"title": "Red Hat Security Advisory: httpd security update",
"tracking": {
"current_release_date": "2025-11-21T17:34:51+00:00",
"generator": {
"date": "2025-11-21T17:34:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1148",
"initial_release_date": "2009-07-09T16:10:00+00:00",
"revision_history": [
{
"date": "2009-07-09T16:10:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-07-09T12:10:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:34:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"product_id": "httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-22.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"product": {
"name": "httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"product_id": "httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-22.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"product": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"product_id": "httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-22.el5_3.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-22.el5_3.2.x86_64",
"product": {
"name": "mod_ssl-1:2.2.3-22.el5_3.2.x86_64",
"product_id": "mod_ssl-1:2.2.3-22.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-22.el5_3.2?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-22.el5_3.2.x86_64",
"product": {
"name": "httpd-0:2.2.3-22.el5_3.2.x86_64",
"product_id": "httpd-0:2.2.3-22.el5_3.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-22.el5_3.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"product": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"product_id": "httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-22.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-22.el5_3.2.i386",
"product": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.i386",
"product_id": "httpd-devel-0:2.2.3-22.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-22.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-22.el5_3.2.i386",
"product": {
"name": "httpd-manual-0:2.2.3-22.el5_3.2.i386",
"product_id": "httpd-manual-0:2.2.3-22.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-22.el5_3.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-22.el5_3.2.i386",
"product": {
"name": "mod_ssl-1:2.2.3-22.el5_3.2.i386",
"product_id": "mod_ssl-1:2.2.3-22.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-22.el5_3.2?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-22.el5_3.2.i386",
"product": {
"name": "httpd-0:2.2.3-22.el5_3.2.i386",
"product_id": "httpd-0:2.2.3-22.el5_3.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-22.el5_3.2?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.2.3-22.el5_3.2.src",
"product": {
"name": "httpd-0:2.2.3-22.el5_3.2.src",
"product_id": "httpd-0:2.2.3-22.el5_3.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-22.el5_3.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"product": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"product_id": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-22.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"product": {
"name": "httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"product_id": "httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-22.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"product": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"product_id": "httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-22.el5_3.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"product": {
"name": "mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"product_id": "mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-22.el5_3.2?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-22.el5_3.2.ia64",
"product": {
"name": "httpd-0:2.2.3-22.el5_3.2.ia64",
"product_id": "httpd-0:2.2.3-22.el5_3.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-22.el5_3.2?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"product": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"product_id": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-22.el5_3.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"product": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"product_id": "httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-22.el5_3.2?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"product": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"product_id": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-22.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"product": {
"name": "httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"product_id": "httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-22.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"product": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"product_id": "httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-22.el5_3.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"product": {
"name": "mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"product_id": "mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-22.el5_3.2?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-22.el5_3.2.ppc",
"product": {
"name": "httpd-0:2.2.3-22.el5_3.2.ppc",
"product_id": "httpd-0:2.2.3-22.el5_3.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-22.el5_3.2?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"product": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"product_id": "httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-22.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"product": {
"name": "httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"product_id": "httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.3-22.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"product": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"product_id": "httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-22.el5_3.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"product": {
"name": "mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"product_id": "mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.3-22.el5_3.2?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.3-22.el5_3.2.s390x",
"product": {
"name": "httpd-0:2.2.3-22.el5_3.2.s390x",
"product_id": "httpd-0:2.2.3-22.el5_3.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.3-22.el5_3.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"product": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"product_id": "httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.3-22.el5_3.2?arch=s390"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.3-22.el5_3.2.s390",
"product": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.s390",
"product_id": "httpd-devel-0:2.2.3-22.el5_3.2.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.3-22.el5_3.2?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.i386"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.ia64"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.ppc"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.s390x"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.src"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.2.src",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.x86_64"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.i386"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ia64"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ppc"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ppc64"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.s390 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.s390"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.s390",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.s390x"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.x86_64"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.i386"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.ia64"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.ppc"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.s390x"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.x86_64"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.i386"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.2.i386",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.ia64"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.ppc"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.s390x"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)",
"product_id": "5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.x86_64"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.2.x86_64",
"relates_to_product_reference": "5Client-Workstation"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-0:2.2.3-22.el5_3.2.i386"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-0:2.2.3-22.el5_3.2.ia64"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-0:2.2.3-22.el5_3.2.ppc"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-0:2.2.3-22.el5_3.2.s390x"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-0:2.2.3-22.el5_3.2.src"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.2.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-0:2.2.3-22.el5_3.2.x86_64"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-devel-0:2.2.3-22.el5_3.2.i386"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-devel-0:2.2.3-22.el5_3.2.ia64"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-devel-0:2.2.3-22.el5_3.2.ppc"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-devel-0:2.2.3-22.el5_3.2.ppc64"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-devel-0:2.2.3-22.el5_3.2.s390"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.s390",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-devel-0:2.2.3-22.el5_3.2.s390x"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-devel-0:2.2.3-22.el5_3.2.x86_64"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-manual-0:2.2.3-22.el5_3.2.i386"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-manual-0:2.2.3-22.el5_3.2.ia64"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-manual-0:2.2.3-22.el5_3.2.ppc"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-manual-0:2.2.3-22.el5_3.2.s390x"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:httpd-manual-0:2.2.3-22.el5_3.2.x86_64"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:mod_ssl-1:2.2.3-22.el5_3.2.i386"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.2.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:mod_ssl-1:2.2.3-22.el5_3.2.ia64"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:mod_ssl-1:2.2.3-22.el5_3.2.ppc"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:mod_ssl-1:2.2.3-22.el5_3.2.s390x"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:mod_ssl-1:2.2.3-22.el5_3.2.x86_64"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.2.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-0:2.2.3-22.el5_3.2.i386"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-0:2.2.3-22.el5_3.2.ia64"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-0:2.2.3-22.el5_3.2.ppc"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-0:2.2.3-22.el5_3.2.s390x"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.2.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-0:2.2.3-22.el5_3.2.src"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.2.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.3-22.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-0:2.2.3-22.el5_3.2.x86_64"
},
"product_reference": "httpd-0:2.2.3-22.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-devel-0:2.2.3-22.el5_3.2.i386"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-devel-0:2.2.3-22.el5_3.2.ia64"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-devel-0:2.2.3-22.el5_3.2.ppc"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-devel-0:2.2.3-22.el5_3.2.ppc64"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-devel-0:2.2.3-22.el5_3.2.s390"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.s390",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-devel-0:2.2.3-22.el5_3.2.s390x"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.3-22.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-devel-0:2.2.3-22.el5_3.2.x86_64"
},
"product_reference": "httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-manual-0:2.2.3-22.el5_3.2.i386"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-manual-0:2.2.3-22.el5_3.2.ia64"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-manual-0:2.2.3-22.el5_3.2.ppc"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-manual-0:2.2.3-22.el5_3.2.s390x"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.3-22.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:httpd-manual-0:2.2.3-22.el5_3.2.x86_64"
},
"product_reference": "httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:mod_ssl-1:2.2.3-22.el5_3.2.i386"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.2.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:mod_ssl-1:2.2.3-22.el5_3.2.ia64"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:mod_ssl-1:2.2.3-22.el5_3.2.ppc"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:mod_ssl-1:2.2.3-22.el5_3.2.s390x"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.3-22.el5_3.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:mod_ssl-1:2.2.3-22.el5_3.2.x86_64"
},
"product_reference": "mod_ssl-1:2.2.3-22.el5_3.2.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-1890",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2009-06-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "509375"
}
],
"notes": [
{
"category": "description",
"text": "The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_proxy reverse proxy DoS (infinite loop)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.src",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.s390",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-0:2.2.3-22.el5_3.2.src",
"5Client:httpd-0:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.s390",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.i386",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-0:2.2.3-22.el5_3.2.src",
"5Server:httpd-0:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.s390",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.i386",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1890"
},
{
"category": "external",
"summary": "RHBZ#509375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509375"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1890",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1890"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1890",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1890"
}
],
"release_date": "2009-07-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-09T16:10:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.src",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.s390",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-0:2.2.3-22.el5_3.2.src",
"5Client:httpd-0:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.s390",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.i386",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-0:2.2.3-22.el5_3.2.src",
"5Server:httpd-0:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.s390",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.i386",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1148"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.src",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.s390",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-0:2.2.3-22.el5_3.2.src",
"5Client:httpd-0:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.s390",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.i386",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-0:2.2.3-22.el5_3.2.src",
"5Server:httpd-0:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.s390",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.i386",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: mod_proxy reverse proxy DoS (infinite loop)"
},
{
"cve": "CVE-2009-1891",
"discovery_date": "2009-06-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "509125"
}
],
"notes": [
{
"category": "description",
"text": "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: possible temporary DoS (CPU consumption) in mod_deflate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.src",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.s390",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-0:2.2.3-22.el5_3.2.src",
"5Client:httpd-0:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.s390",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.i386",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-0:2.2.3-22.el5_3.2.src",
"5Server:httpd-0:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.s390",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.i386",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1891"
},
{
"category": "external",
"summary": "RHBZ#509125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891"
}
],
"release_date": "2009-06-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-09T16:10:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.src",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.s390",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-0:2.2.3-22.el5_3.2.src",
"5Client:httpd-0:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.s390",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.i386",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-0:2.2.3-22.el5_3.2.src",
"5Server:httpd-0:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.s390",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.i386",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1148"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.src",
"5Client-Workstation:httpd-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.s390",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.i386",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"5Client-Workstation:mod_ssl-1:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-0:2.2.3-22.el5_3.2.src",
"5Client:httpd-0:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.s390",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.i386",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"5Client:httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.i386",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"5Client:mod_ssl-1:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-0:2.2.3-22.el5_3.2.src",
"5Server:httpd-0:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.ppc64",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-debuginfo-0:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.ppc64",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.s390",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-devel-0:2.2.3-22.el5_3.2.x86_64",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.i386",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.ia64",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.ppc",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.s390x",
"5Server:httpd-manual-0:2.2.3-22.el5_3.2.x86_64",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.i386",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.ia64",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.ppc",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.s390x",
"5Server:mod_ssl-1:2.2.3-22.el5_3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: possible temporary DoS (CPU consumption) in mod_deflate"
}
]
}
RHSA-2009:1580
Vulnerability from csaf_redhat - Published: 2009-11-11 22:02 - Updated: 2025-11-21 17:35The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.
The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated httpd packages that fix multiple security issues are now available\nfor Red Hat Enterprise Linux 4.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache HTTP Server is a popular Web server.\n\nA flaw was found in the way the TLS/SSL (Transport Layer Security/Secure\nSockets Layer) protocols handle session renegotiation. A man-in-the-middle\nattacker could use this flaw to prefix arbitrary plain text to a client\u0027s\nsession (for example, an HTTPS connection to a website). This could force\nthe server to process an attacker\u0027s request as if authenticated using the\nvictim\u0027s credentials. This update partially mitigates this flaw for SSL\nsessions to HTTP servers using mod_ssl by rejecting client-requested\nrenegotiation. (CVE-2009-3555)\n\nNote: This update does not fully resolve the issue for HTTPS servers. An\nattack is still possible in configurations that require a server-initiated\nrenegotiation. Refer to the following Knowledgebase article for further\ninformation: http://kbase.redhat.com/faq/docs/DOC-20491\n\nA denial of service flaw was found in the Apache mod_deflate module. This\nmodule continued to compress large files until compression was complete,\neven if the network connection that requested the content was closed before\ncompression completed. This would cause mod_deflate to consume large\namounts of CPU if mod_deflate was enabled for a large file. (CVE-2009-1891)\n\nA NULL pointer dereference flaw was found in the Apache mod_proxy_ftp\nmodule. A malicious FTP server to which requests are being proxied could\nuse this flaw to crash an httpd child process via a malformed reply to the\nEPSV or PASV commands, resulting in a limited denial of service.\n(CVE-2009-3094)\n\nA second flaw was found in the Apache mod_proxy_ftp module. In a reverse\nproxy configuration, a remote attacker could use this flaw to bypass\nintended access restrictions by creating a carefully-crafted HTTP\nAuthorization header, allowing the attacker to send arbitrary commands to\nthe FTP server. (CVE-2009-3095)\n\nAll httpd users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, the httpd daemon must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1580",
"url": "https://access.redhat.com/errata/RHSA-2009:1580"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://kbase.redhat.com/faq/docs/DOC-20491",
"url": "http://kbase.redhat.com/faq/docs/DOC-20491"
},
{
"category": "external",
"summary": "509125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"category": "external",
"summary": "521619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521619"
},
{
"category": "external",
"summary": "522209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=522209"
},
{
"category": "external",
"summary": "533125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1580.json"
}
],
"title": "Red Hat Security Advisory: httpd security update",
"tracking": {
"current_release_date": "2025-11-21T17:35:27+00:00",
"generator": {
"date": "2025-11-21T17:35:27+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1580",
"initial_release_date": "2009-11-11T22:02:00+00:00",
"revision_history": [
{
"date": "2009-11-11T22:02:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-11-11T17:05:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:35:27+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-suexec-0:2.0.52-41.ent.6.ia64",
"product": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.ia64",
"product_id": "httpd-suexec-0:2.0.52-41.ent.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-suexec@2.0.52-41.ent.6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.0.52-41.ent.6.ia64",
"product": {
"name": "httpd-devel-0:2.0.52-41.ent.6.ia64",
"product_id": "httpd-devel-0:2.0.52-41.ent.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.0.52-41.ent.6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.0.52-41.ent.6.ia64",
"product": {
"name": "httpd-manual-0:2.0.52-41.ent.6.ia64",
"product_id": "httpd-manual-0:2.0.52-41.ent.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.0.52-41.ent.6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.0.52-41.ent.6.ia64",
"product": {
"name": "httpd-0:2.0.52-41.ent.6.ia64",
"product_id": "httpd-0:2.0.52-41.ent.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.52-41.ent.6?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.0.52-41.ent.6.ia64",
"product": {
"name": "mod_ssl-1:2.0.52-41.ent.6.ia64",
"product_id": "mod_ssl-1:2.0.52-41.ent.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.0.52-41.ent.6?arch=ia64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"product": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"product_id": "httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.0.52-41.ent.6?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"product": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"product_id": "httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-suexec@2.0.52-41.ent.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.0.52-41.ent.6.x86_64",
"product": {
"name": "httpd-devel-0:2.0.52-41.ent.6.x86_64",
"product_id": "httpd-devel-0:2.0.52-41.ent.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.0.52-41.ent.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.0.52-41.ent.6.x86_64",
"product": {
"name": "httpd-manual-0:2.0.52-41.ent.6.x86_64",
"product_id": "httpd-manual-0:2.0.52-41.ent.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.0.52-41.ent.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.0.52-41.ent.6.x86_64",
"product": {
"name": "httpd-0:2.0.52-41.ent.6.x86_64",
"product_id": "httpd-0:2.0.52-41.ent.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.52-41.ent.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.0.52-41.ent.6.x86_64",
"product": {
"name": "mod_ssl-1:2.0.52-41.ent.6.x86_64",
"product_id": "mod_ssl-1:2.0.52-41.ent.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.0.52-41.ent.6?arch=x86_64\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"product_id": "httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.0.52-41.ent.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-suexec-0:2.0.52-41.ent.6.i386",
"product": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.i386",
"product_id": "httpd-suexec-0:2.0.52-41.ent.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-suexec@2.0.52-41.ent.6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.0.52-41.ent.6.i386",
"product": {
"name": "httpd-devel-0:2.0.52-41.ent.6.i386",
"product_id": "httpd-devel-0:2.0.52-41.ent.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.0.52-41.ent.6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.0.52-41.ent.6.i386",
"product": {
"name": "httpd-manual-0:2.0.52-41.ent.6.i386",
"product_id": "httpd-manual-0:2.0.52-41.ent.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.0.52-41.ent.6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.0.52-41.ent.6.i386",
"product": {
"name": "httpd-0:2.0.52-41.ent.6.i386",
"product_id": "httpd-0:2.0.52-41.ent.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.52-41.ent.6?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.0.52-41.ent.6.i386",
"product": {
"name": "mod_ssl-1:2.0.52-41.ent.6.i386",
"product_id": "mod_ssl-1:2.0.52-41.ent.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.0.52-41.ent.6?arch=i386\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"product": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"product_id": "httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.0.52-41.ent.6?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.0.52-41.ent.6.src",
"product": {
"name": "httpd-0:2.0.52-41.ent.6.src",
"product_id": "httpd-0:2.0.52-41.ent.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.52-41.ent.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-suexec-0:2.0.52-41.ent.6.ppc",
"product": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.ppc",
"product_id": "httpd-suexec-0:2.0.52-41.ent.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-suexec@2.0.52-41.ent.6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.0.52-41.ent.6.ppc",
"product": {
"name": "httpd-devel-0:2.0.52-41.ent.6.ppc",
"product_id": "httpd-devel-0:2.0.52-41.ent.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.0.52-41.ent.6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.0.52-41.ent.6.ppc",
"product": {
"name": "httpd-manual-0:2.0.52-41.ent.6.ppc",
"product_id": "httpd-manual-0:2.0.52-41.ent.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.0.52-41.ent.6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.0.52-41.ent.6.ppc",
"product": {
"name": "httpd-0:2.0.52-41.ent.6.ppc",
"product_id": "httpd-0:2.0.52-41.ent.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.52-41.ent.6?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.0.52-41.ent.6.ppc",
"product": {
"name": "mod_ssl-1:2.0.52-41.ent.6.ppc",
"product_id": "mod_ssl-1:2.0.52-41.ent.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.0.52-41.ent.6?arch=ppc\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"product": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"product_id": "httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.0.52-41.ent.6?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-suexec-0:2.0.52-41.ent.6.s390x",
"product": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.s390x",
"product_id": "httpd-suexec-0:2.0.52-41.ent.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-suexec@2.0.52-41.ent.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.0.52-41.ent.6.s390x",
"product": {
"name": "httpd-devel-0:2.0.52-41.ent.6.s390x",
"product_id": "httpd-devel-0:2.0.52-41.ent.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.0.52-41.ent.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.0.52-41.ent.6.s390x",
"product": {
"name": "httpd-manual-0:2.0.52-41.ent.6.s390x",
"product_id": "httpd-manual-0:2.0.52-41.ent.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.0.52-41.ent.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.0.52-41.ent.6.s390x",
"product": {
"name": "httpd-0:2.0.52-41.ent.6.s390x",
"product_id": "httpd-0:2.0.52-41.ent.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.52-41.ent.6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.0.52-41.ent.6.s390x",
"product": {
"name": "mod_ssl-1:2.0.52-41.ent.6.s390x",
"product_id": "mod_ssl-1:2.0.52-41.ent.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.0.52-41.ent.6?arch=s390x\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"product": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"product_id": "httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.0.52-41.ent.6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-suexec-0:2.0.52-41.ent.6.s390",
"product": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.s390",
"product_id": "httpd-suexec-0:2.0.52-41.ent.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-suexec@2.0.52-41.ent.6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.0.52-41.ent.6.s390",
"product": {
"name": "httpd-devel-0:2.0.52-41.ent.6.s390",
"product_id": "httpd-devel-0:2.0.52-41.ent.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.0.52-41.ent.6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.0.52-41.ent.6.s390",
"product": {
"name": "httpd-manual-0:2.0.52-41.ent.6.s390",
"product_id": "httpd-manual-0:2.0.52-41.ent.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.0.52-41.ent.6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.0.52-41.ent.6.s390",
"product": {
"name": "httpd-0:2.0.52-41.ent.6.s390",
"product_id": "httpd-0:2.0.52-41.ent.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.0.52-41.ent.6?arch=s390"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.0.52-41.ent.6.s390",
"product": {
"name": "mod_ssl-1:2.0.52-41.ent.6.s390",
"product_id": "mod_ssl-1:2.0.52-41.ent.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.0.52-41.ent.6?arch=s390\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"product": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"product_id": "httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.0.52-41.ent.6?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-0:2.0.52-41.ent.6.i386"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-0:2.0.52-41.ent.6.ia64"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-0:2.0.52-41.ent.6.ppc"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-0:2.0.52-41.ent.6.s390"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-0:2.0.52-41.ent.6.s390x"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-0:2.0.52-41.ent.6.src"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-0:2.0.52-41.ent.6.x86_64"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-debuginfo-0:2.0.52-41.ent.6.i386"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-devel-0:2.0.52-41.ent.6.i386"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-devel-0:2.0.52-41.ent.6.ia64"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-devel-0:2.0.52-41.ent.6.ppc"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-devel-0:2.0.52-41.ent.6.s390"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-devel-0:2.0.52-41.ent.6.s390x"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-devel-0:2.0.52-41.ent.6.x86_64"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-manual-0:2.0.52-41.ent.6.i386"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-manual-0:2.0.52-41.ent.6.ia64"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-manual-0:2.0.52-41.ent.6.ppc"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-manual-0:2.0.52-41.ent.6.s390"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-manual-0:2.0.52-41.ent.6.s390x"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-manual-0:2.0.52-41.ent.6.x86_64"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-suexec-0:2.0.52-41.ent.6.i386"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-suexec-0:2.0.52-41.ent.6.ia64"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-suexec-0:2.0.52-41.ent.6.ppc"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-suexec-0:2.0.52-41.ent.6.s390"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-suexec-0:2.0.52-41.ent.6.s390x"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:httpd-suexec-0:2.0.52-41.ent.6.x86_64"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mod_ssl-1:2.0.52-41.ent.6.i386"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mod_ssl-1:2.0.52-41.ent.6.ia64"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mod_ssl-1:2.0.52-41.ent.6.ppc"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mod_ssl-1:2.0.52-41.ent.6.s390"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mod_ssl-1:2.0.52-41.ent.6.s390x"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:mod_ssl-1:2.0.52-41.ent.6.x86_64"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-0:2.0.52-41.ent.6.i386"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-0:2.0.52-41.ent.6.ia64"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-0:2.0.52-41.ent.6.ppc"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-0:2.0.52-41.ent.6.s390"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-0:2.0.52-41.ent.6.s390x"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-0:2.0.52-41.ent.6.src"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-0:2.0.52-41.ent.6.x86_64"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.i386"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ia64"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ppc"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390x"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-devel-0:2.0.52-41.ent.6.i386"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-devel-0:2.0.52-41.ent.6.ia64"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-devel-0:2.0.52-41.ent.6.ppc"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390x"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-devel-0:2.0.52-41.ent.6.x86_64"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-manual-0:2.0.52-41.ent.6.i386"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-manual-0:2.0.52-41.ent.6.ia64"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-manual-0:2.0.52-41.ent.6.ppc"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390x"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-manual-0:2.0.52-41.ent.6.x86_64"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-suexec-0:2.0.52-41.ent.6.i386"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ia64"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ppc"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390x"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:httpd-suexec-0:2.0.52-41.ent.6.x86_64"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mod_ssl-1:2.0.52-41.ent.6.i386"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mod_ssl-1:2.0.52-41.ent.6.ia64"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mod_ssl-1:2.0.52-41.ent.6.ppc"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390x"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:mod_ssl-1:2.0.52-41.ent.6.x86_64"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-0:2.0.52-41.ent.6.i386"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-0:2.0.52-41.ent.6.ia64"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-0:2.0.52-41.ent.6.ppc"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-0:2.0.52-41.ent.6.s390"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-0:2.0.52-41.ent.6.s390x"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-0:2.0.52-41.ent.6.src"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-0:2.0.52-41.ent.6.x86_64"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-debuginfo-0:2.0.52-41.ent.6.i386"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ia64"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ppc"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390x"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-devel-0:2.0.52-41.ent.6.i386"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-devel-0:2.0.52-41.ent.6.ia64"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-devel-0:2.0.52-41.ent.6.ppc"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-devel-0:2.0.52-41.ent.6.s390"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-devel-0:2.0.52-41.ent.6.s390x"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-devel-0:2.0.52-41.ent.6.x86_64"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-manual-0:2.0.52-41.ent.6.i386"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-manual-0:2.0.52-41.ent.6.ia64"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-manual-0:2.0.52-41.ent.6.ppc"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-manual-0:2.0.52-41.ent.6.s390"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-manual-0:2.0.52-41.ent.6.s390x"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-manual-0:2.0.52-41.ent.6.x86_64"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-suexec-0:2.0.52-41.ent.6.i386"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-suexec-0:2.0.52-41.ent.6.ia64"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-suexec-0:2.0.52-41.ent.6.ppc"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-suexec-0:2.0.52-41.ent.6.s390"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-suexec-0:2.0.52-41.ent.6.s390x"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:httpd-suexec-0:2.0.52-41.ent.6.x86_64"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mod_ssl-1:2.0.52-41.ent.6.i386"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mod_ssl-1:2.0.52-41.ent.6.ia64"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mod_ssl-1:2.0.52-41.ent.6.ppc"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mod_ssl-1:2.0.52-41.ent.6.s390"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mod_ssl-1:2.0.52-41.ent.6.s390x"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:mod_ssl-1:2.0.52-41.ent.6.x86_64"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-0:2.0.52-41.ent.6.i386"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-0:2.0.52-41.ent.6.ia64"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-0:2.0.52-41.ent.6.ppc"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-0:2.0.52-41.ent.6.s390"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-0:2.0.52-41.ent.6.s390x"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-0:2.0.52-41.ent.6.src"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-0:2.0.52-41.ent.6.x86_64"
},
"product_reference": "httpd-0:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-debuginfo-0:2.0.52-41.ent.6.i386"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-devel-0:2.0.52-41.ent.6.i386"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-devel-0:2.0.52-41.ent.6.ia64"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-devel-0:2.0.52-41.ent.6.ppc"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-devel-0:2.0.52-41.ent.6.s390"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-devel-0:2.0.52-41.ent.6.s390x"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-devel-0:2.0.52-41.ent.6.x86_64"
},
"product_reference": "httpd-devel-0:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-manual-0:2.0.52-41.ent.6.i386"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-manual-0:2.0.52-41.ent.6.ia64"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-manual-0:2.0.52-41.ent.6.ppc"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-manual-0:2.0.52-41.ent.6.s390"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-manual-0:2.0.52-41.ent.6.s390x"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-manual-0:2.0.52-41.ent.6.x86_64"
},
"product_reference": "httpd-manual-0:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-suexec-0:2.0.52-41.ent.6.i386"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-suexec-0:2.0.52-41.ent.6.ia64"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-suexec-0:2.0.52-41.ent.6.ppc"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-suexec-0:2.0.52-41.ent.6.s390"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-suexec-0:2.0.52-41.ent.6.s390x"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-suexec-0:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:httpd-suexec-0:2.0.52-41.ent.6.x86_64"
},
"product_reference": "httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mod_ssl-1:2.0.52-41.ent.6.i386"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mod_ssl-1:2.0.52-41.ent.6.ia64"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mod_ssl-1:2.0.52-41.ent.6.ppc"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mod_ssl-1:2.0.52-41.ent.6.s390"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mod_ssl-1:2.0.52-41.ent.6.s390x"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.0.52-41.ent.6.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:mod_ssl-1:2.0.52-41.ent.6.x86_64"
},
"product_reference": "mod_ssl-1:2.0.52-41.ent.6.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-1891",
"discovery_date": "2009-06-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "509125"
}
],
"notes": [
{
"category": "description",
"text": "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: possible temporary DoS (CPU consumption) in mod_deflate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:httpd-0:2.0.52-41.ent.6.i386",
"4AS:httpd-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-0:2.0.52-41.ent.6.s390",
"4AS:httpd-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-0:2.0.52-41.ent.6.src",
"4AS:httpd-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4AS:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-0:2.0.52-41.ent.6.src",
"4Desktop:httpd-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.i386",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4ES:httpd-0:2.0.52-41.ent.6.i386",
"4ES:httpd-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-0:2.0.52-41.ent.6.s390",
"4ES:httpd-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-0:2.0.52-41.ent.6.src",
"4ES:httpd-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.i386",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.i386",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.i386",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4ES:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4WS:httpd-0:2.0.52-41.ent.6.i386",
"4WS:httpd-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-0:2.0.52-41.ent.6.s390",
"4WS:httpd-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-0:2.0.52-41.ent.6.src",
"4WS:httpd-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4WS:mod_ssl-1:2.0.52-41.ent.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1891"
},
{
"category": "external",
"summary": "RHBZ#509125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891"
}
],
"release_date": "2009-06-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-11T22:02:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:httpd-0:2.0.52-41.ent.6.i386",
"4AS:httpd-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-0:2.0.52-41.ent.6.s390",
"4AS:httpd-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-0:2.0.52-41.ent.6.src",
"4AS:httpd-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4AS:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-0:2.0.52-41.ent.6.src",
"4Desktop:httpd-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.i386",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4ES:httpd-0:2.0.52-41.ent.6.i386",
"4ES:httpd-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-0:2.0.52-41.ent.6.s390",
"4ES:httpd-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-0:2.0.52-41.ent.6.src",
"4ES:httpd-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.i386",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.i386",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.i386",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4ES:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4WS:httpd-0:2.0.52-41.ent.6.i386",
"4WS:httpd-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-0:2.0.52-41.ent.6.s390",
"4WS:httpd-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-0:2.0.52-41.ent.6.src",
"4WS:httpd-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4WS:mod_ssl-1:2.0.52-41.ent.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1580"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS:httpd-0:2.0.52-41.ent.6.i386",
"4AS:httpd-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-0:2.0.52-41.ent.6.s390",
"4AS:httpd-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-0:2.0.52-41.ent.6.src",
"4AS:httpd-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4AS:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-0:2.0.52-41.ent.6.src",
"4Desktop:httpd-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.i386",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4ES:httpd-0:2.0.52-41.ent.6.i386",
"4ES:httpd-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-0:2.0.52-41.ent.6.s390",
"4ES:httpd-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-0:2.0.52-41.ent.6.src",
"4ES:httpd-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.i386",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.i386",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.i386",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4ES:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4WS:httpd-0:2.0.52-41.ent.6.i386",
"4WS:httpd-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-0:2.0.52-41.ent.6.s390",
"4WS:httpd-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-0:2.0.52-41.ent.6.src",
"4WS:httpd-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4WS:mod_ssl-1:2.0.52-41.ent.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: possible temporary DoS (CPU consumption) in mod_deflate"
},
{
"cve": "CVE-2009-3094",
"discovery_date": "2009-09-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "521619"
}
],
"notes": [
{
"category": "description",
"text": "The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: NULL pointer defer in mod_proxy_ftp caused by crafted EPSV and PASV reply",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:httpd-0:2.0.52-41.ent.6.i386",
"4AS:httpd-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-0:2.0.52-41.ent.6.s390",
"4AS:httpd-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-0:2.0.52-41.ent.6.src",
"4AS:httpd-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4AS:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-0:2.0.52-41.ent.6.src",
"4Desktop:httpd-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.i386",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4ES:httpd-0:2.0.52-41.ent.6.i386",
"4ES:httpd-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-0:2.0.52-41.ent.6.s390",
"4ES:httpd-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-0:2.0.52-41.ent.6.src",
"4ES:httpd-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.i386",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.i386",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.i386",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4ES:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4WS:httpd-0:2.0.52-41.ent.6.i386",
"4WS:httpd-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-0:2.0.52-41.ent.6.s390",
"4WS:httpd-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-0:2.0.52-41.ent.6.src",
"4WS:httpd-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4WS:mod_ssl-1:2.0.52-41.ent.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3094"
},
{
"category": "external",
"summary": "RHBZ#521619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521619"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3094"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3094",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3094"
}
],
"release_date": "2009-09-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-11T22:02:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:httpd-0:2.0.52-41.ent.6.i386",
"4AS:httpd-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-0:2.0.52-41.ent.6.s390",
"4AS:httpd-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-0:2.0.52-41.ent.6.src",
"4AS:httpd-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4AS:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-0:2.0.52-41.ent.6.src",
"4Desktop:httpd-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.i386",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4ES:httpd-0:2.0.52-41.ent.6.i386",
"4ES:httpd-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-0:2.0.52-41.ent.6.s390",
"4ES:httpd-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-0:2.0.52-41.ent.6.src",
"4ES:httpd-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.i386",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.i386",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.i386",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4ES:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4WS:httpd-0:2.0.52-41.ent.6.i386",
"4WS:httpd-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-0:2.0.52-41.ent.6.s390",
"4WS:httpd-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-0:2.0.52-41.ent.6.src",
"4WS:httpd-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4WS:mod_ssl-1:2.0.52-41.ent.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1580"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS:httpd-0:2.0.52-41.ent.6.i386",
"4AS:httpd-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-0:2.0.52-41.ent.6.s390",
"4AS:httpd-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-0:2.0.52-41.ent.6.src",
"4AS:httpd-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4AS:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-0:2.0.52-41.ent.6.src",
"4Desktop:httpd-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.i386",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4ES:httpd-0:2.0.52-41.ent.6.i386",
"4ES:httpd-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-0:2.0.52-41.ent.6.s390",
"4ES:httpd-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-0:2.0.52-41.ent.6.src",
"4ES:httpd-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.i386",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.i386",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.i386",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4ES:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4WS:httpd-0:2.0.52-41.ent.6.i386",
"4WS:httpd-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-0:2.0.52-41.ent.6.s390",
"4WS:httpd-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-0:2.0.52-41.ent.6.src",
"4WS:httpd-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4WS:mod_ssl-1:2.0.52-41.ent.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: NULL pointer defer in mod_proxy_ftp caused by crafted EPSV and PASV reply"
},
{
"cve": "CVE-2009-3095",
"discovery_date": "2009-09-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "522209"
}
],
"notes": [
{
"category": "description",
"text": "The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_proxy_ftp FTP command injection via Authorization HTTP header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:httpd-0:2.0.52-41.ent.6.i386",
"4AS:httpd-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-0:2.0.52-41.ent.6.s390",
"4AS:httpd-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-0:2.0.52-41.ent.6.src",
"4AS:httpd-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4AS:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-0:2.0.52-41.ent.6.src",
"4Desktop:httpd-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.i386",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4ES:httpd-0:2.0.52-41.ent.6.i386",
"4ES:httpd-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-0:2.0.52-41.ent.6.s390",
"4ES:httpd-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-0:2.0.52-41.ent.6.src",
"4ES:httpd-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.i386",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.i386",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.i386",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4ES:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4WS:httpd-0:2.0.52-41.ent.6.i386",
"4WS:httpd-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-0:2.0.52-41.ent.6.s390",
"4WS:httpd-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-0:2.0.52-41.ent.6.src",
"4WS:httpd-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4WS:mod_ssl-1:2.0.52-41.ent.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3095"
},
{
"category": "external",
"summary": "RHBZ#522209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=522209"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3095"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3095",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3095"
}
],
"release_date": "2009-09-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-11T22:02:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:httpd-0:2.0.52-41.ent.6.i386",
"4AS:httpd-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-0:2.0.52-41.ent.6.s390",
"4AS:httpd-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-0:2.0.52-41.ent.6.src",
"4AS:httpd-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4AS:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-0:2.0.52-41.ent.6.src",
"4Desktop:httpd-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.i386",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4ES:httpd-0:2.0.52-41.ent.6.i386",
"4ES:httpd-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-0:2.0.52-41.ent.6.s390",
"4ES:httpd-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-0:2.0.52-41.ent.6.src",
"4ES:httpd-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.i386",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.i386",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.i386",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4ES:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4WS:httpd-0:2.0.52-41.ent.6.i386",
"4WS:httpd-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-0:2.0.52-41.ent.6.s390",
"4WS:httpd-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-0:2.0.52-41.ent.6.src",
"4WS:httpd-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4WS:mod_ssl-1:2.0.52-41.ent.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1580"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS:httpd-0:2.0.52-41.ent.6.i386",
"4AS:httpd-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-0:2.0.52-41.ent.6.s390",
"4AS:httpd-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-0:2.0.52-41.ent.6.src",
"4AS:httpd-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4AS:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-0:2.0.52-41.ent.6.src",
"4Desktop:httpd-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.i386",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4ES:httpd-0:2.0.52-41.ent.6.i386",
"4ES:httpd-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-0:2.0.52-41.ent.6.s390",
"4ES:httpd-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-0:2.0.52-41.ent.6.src",
"4ES:httpd-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.i386",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.i386",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.i386",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4ES:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4WS:httpd-0:2.0.52-41.ent.6.i386",
"4WS:httpd-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-0:2.0.52-41.ent.6.s390",
"4WS:httpd-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-0:2.0.52-41.ent.6.src",
"4WS:httpd-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4WS:mod_ssl-1:2.0.52-41.ent.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: mod_proxy_ftp FTP command injection via Authorization HTTP header"
},
{
"cve": "CVE-2009-3555",
"cwe": {
"id": "CWE-300",
"name": "Channel Accessible by Non-Endpoint"
},
"discovery_date": "2009-10-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "533125"
}
],
"notes": [
{
"category": "description",
"text": "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "TLS: MITM attacks via session renegotiation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Additional information can be found in the Red Hat Knowledgebase article:\nhttps://access.redhat.com/articles/20490",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:httpd-0:2.0.52-41.ent.6.i386",
"4AS:httpd-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-0:2.0.52-41.ent.6.s390",
"4AS:httpd-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-0:2.0.52-41.ent.6.src",
"4AS:httpd-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4AS:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-0:2.0.52-41.ent.6.src",
"4Desktop:httpd-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.i386",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4ES:httpd-0:2.0.52-41.ent.6.i386",
"4ES:httpd-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-0:2.0.52-41.ent.6.s390",
"4ES:httpd-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-0:2.0.52-41.ent.6.src",
"4ES:httpd-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.i386",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.i386",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.i386",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4ES:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4WS:httpd-0:2.0.52-41.ent.6.i386",
"4WS:httpd-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-0:2.0.52-41.ent.6.s390",
"4WS:httpd-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-0:2.0.52-41.ent.6.src",
"4WS:httpd-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4WS:mod_ssl-1:2.0.52-41.ent.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3555"
},
{
"category": "external",
"summary": "RHBZ#533125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555"
}
],
"release_date": "2009-11-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-11-11T22:02:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS:httpd-0:2.0.52-41.ent.6.i386",
"4AS:httpd-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-0:2.0.52-41.ent.6.s390",
"4AS:httpd-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-0:2.0.52-41.ent.6.src",
"4AS:httpd-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4AS:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-0:2.0.52-41.ent.6.src",
"4Desktop:httpd-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.i386",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4ES:httpd-0:2.0.52-41.ent.6.i386",
"4ES:httpd-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-0:2.0.52-41.ent.6.s390",
"4ES:httpd-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-0:2.0.52-41.ent.6.src",
"4ES:httpd-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.i386",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.i386",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.i386",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4ES:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4WS:httpd-0:2.0.52-41.ent.6.i386",
"4WS:httpd-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-0:2.0.52-41.ent.6.s390",
"4WS:httpd-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-0:2.0.52-41.ent.6.src",
"4WS:httpd-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4WS:mod_ssl-1:2.0.52-41.ent.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1580"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS:httpd-0:2.0.52-41.ent.6.i386",
"4AS:httpd-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-0:2.0.52-41.ent.6.s390",
"4AS:httpd-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-0:2.0.52-41.ent.6.src",
"4AS:httpd-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4AS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4AS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4AS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4AS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4AS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4AS:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-0:2.0.52-41.ent.6.src",
"4Desktop:httpd-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4Desktop:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.i386",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4Desktop:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4ES:httpd-0:2.0.52-41.ent.6.i386",
"4ES:httpd-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-0:2.0.52-41.ent.6.s390",
"4ES:httpd-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-0:2.0.52-41.ent.6.src",
"4ES:httpd-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.i386",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390",
"4ES:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.i386",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390",
"4ES:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4ES:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.i386",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4ES:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390",
"4ES:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4ES:mod_ssl-1:2.0.52-41.ent.6.x86_64",
"4WS:httpd-0:2.0.52-41.ent.6.i386",
"4WS:httpd-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-0:2.0.52-41.ent.6.s390",
"4WS:httpd-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-0:2.0.52-41.ent.6.src",
"4WS:httpd-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.i386",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-debuginfo-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.i386",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-devel-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390",
"4WS:httpd-devel-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-devel-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.i386",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-manual-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390",
"4WS:httpd-manual-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-manual-0:2.0.52-41.ent.6.x86_64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.i386",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ia64",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.ppc",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.s390x",
"4WS:httpd-suexec-0:2.0.52-41.ent.6.x86_64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.i386",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ia64",
"4WS:mod_ssl-1:2.0.52-41.ent.6.ppc",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390",
"4WS:mod_ssl-1:2.0.52-41.ent.6.s390x",
"4WS:mod_ssl-1:2.0.52-41.ent.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "TLS: MITM attacks via session renegotiation"
}
]
}
RHSA-2010:0602
Vulnerability from csaf_redhat - Published: 2010-08-04 21:30 - Updated: 2026-01-28 22:51Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
Apache Tomcat 5.5.0 to 5.5.11 allows remote attackers to cause a denial of service (CPU consumption) via a large number of simultaneous requests to list a web directory that has a large number of files.
Apache Tomcat 5 before 5.5.17 allows remote attackers to list directories via a semicolon (;) preceding a filename with a mapped extension, as demonstrated by URLs ending with /;index.jsp and /;help.do.
http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform "charset detection" when the content-type is not specified.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) "/" (slash), (2) "\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.
PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.
Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted "Accept-Language headers that do not conform to RFC 2616".
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.
Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka "SIGUSR1 killer."
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes ("'") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.
The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when using a threaded MPM, allows remote origin servers to cause a denial of service (caching forward proxy process crash) via crafted date headers that trigger a buffer over-read.
CWE-125 - Out-of-bounds ReadCross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset. NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.
Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.
The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.
Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.
Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.
CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.
Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.
Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.
The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.
The MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 might allow local users to cause a denial of service (daemon crash) via crafted SCARD_SET_ATTRIB message data, which is improperly demarshalled and triggers a buffer over-read, a related issue to CVE-2010-0407.
Multiple buffer overflows in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 allow local users to gain privileges via crafted message data, which is improperly demarshalled.
The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated packages that fix multiple security issues and rebase various\ncomponents are now available for Red Hat Certificate System 7.3.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Certificate System (RHCS) is an enterprise software system designed\nto manage enterprise Public Key Infrastructure (PKI) deployments.\n\nMultiple buffer overflow flaws were discovered in the way the pcscd daemon,\na resource manager that coordinates communications with smart card readers\nand smart cards connected to the system, handled client requests. A local\nuser could create a specially-crafted request that would cause the pcscd\ndaemon to crash or, possibly, execute arbitrary code. (CVE-2010-0407,\nCVE-2009-4901)\n\nThis erratum updates the Tomcat component shipped as part of Red Hat\nCertificate System to version 5.5.23, to address multiple security issues.\nIn a typical operating environment, Tomcat is not exposed to users of\nCertificate System in a vulnerable manner. These security updates will\nreduce risk in unique Certificate System environments. (CVE-2005-2090,\nCVE-2005-3510, CVE-2006-3835, CVE-2007-0450, CVE-2007-1358, CVE-2007-3382,\nCVE-2007-3385, CVE-2007-5461, CVE-2007-5333, CVE-2008-0128, CVE-2008-1232,\nCVE-2008-2370, CVE-2008-5515, CVE-2009-0033, CVE-2009-0580)\n\nThis erratum provides updated versions of the following components,\nrequired by the updated Tomcat version: ant, avalon-logkit, axis,\nclasspathx-jaf, classpathx-mail, geronimo-specs, jakarta-commons-modeler,\nlog4j, mx4j, xerces-j2, and xml-commons.\n\nA number of components have been updated to fix security issues for users\nof Red Hat Certificate System for the Solaris operating system. These fixes\nare for apr issue CVE-2009-2412; apr-util issues CVE-2009-0023,\nCVE-2009-1955, CVE-2009-1956, and CVE-2009-2412; httpd issues\nCVE-2006-3918, CVE-2006-5752, CVE-2007-1863, CVE-2007-3304, CVE-2007-3847,\nCVE-2007-4465, CVE-2007-5000, CVE-2007-6388, CVE-2008-0005, CVE-2008-2364,\nCVE-2008-2939, CVE-2009-1891, CVE-2009-3094, CVE-2009-3095, and\nCVE-2010-0434; mod_perl issue CVE-2007-1349; and perl issues CVE-2007-5116\nand CVE-2008-1927.\n\nNote: Updated apr, apr-util, httpd, mod_perl, and perl packages were\npreviously available to users of Red Hat Certificate System for Red Hat\nEnterprise Linux via the Red Hat Enterprise Linux 4 channels on the Red Hat\nNetwork.\n\nAdditionally, the rhpki-ca, rhpki-kra, rhpki-ocsp, rhpki-tks,\nrhpki-java-tools, and rhpki-native-tools packages were updated to address\nsome anomalous behavior on the Solaris operating system. (BZ#600513,\nBZ#605760)\n\nAs well, this update provides an updated rhpki-manage package, which\nincludes installation and uninstall scripts for Red Hat Certificate System\nthat have been updated with the list of packages required by the Tomcat\ncomponent, and an updated dependency on the NSS and NSPR packages.\n\nAll users of Red Hat Certificate System are advised to upgrade to these\nupdated packages, which correct these issues. Refer to the Red Hat\nCertificate System Administration Guide, linked to in the References, for\ndetails on how to install the updated packages on the Solaris operating\nsystem. After installing this update, all Red Hat Certificate System\nsubsystems must be restarted (\"/etc/init.d/[instance-name] restart\") for\nthe update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2010:0602",
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#moderate",
"url": "http://www.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "http://www.redhat.com/docs/manuals/cert-system/7.3/html/Administration_Guide/Administration_Guide-Updating_Certificate_System_Packages-Updating_a_Solaris_9_system_using_pkgrm_and_pkgadd.html",
"url": "http://www.redhat.com/docs/manuals/cert-system/7.3/html/Administration_Guide/Administration_Guide-Updating_Certificate_System_Packages-Updating_a_Solaris_9_system_using_pkgrm_and_pkgadd.html"
},
{
"category": "external",
"summary": "200732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200732"
},
{
"category": "external",
"summary": "237079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237079"
},
{
"category": "external",
"summary": "237080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237080"
},
{
"category": "external",
"summary": "237084",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237084"
},
{
"category": "external",
"summary": "237085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237085"
},
{
"category": "external",
"summary": "240423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=240423"
},
{
"category": "external",
"summary": "244658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=244658"
},
{
"category": "external",
"summary": "244803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=244803"
},
{
"category": "external",
"summary": "245111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245111"
},
{
"category": "external",
"summary": "245112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245112"
},
{
"category": "external",
"summary": "247972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247972"
},
{
"category": "external",
"summary": "247976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247976"
},
{
"category": "external",
"summary": "250731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250731"
},
{
"category": "external",
"summary": "289511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=289511"
},
{
"category": "external",
"summary": "323571",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=323571"
},
{
"category": "external",
"summary": "333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "419931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=419931"
},
{
"category": "external",
"summary": "427228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427228"
},
{
"category": "external",
"summary": "427739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427739"
},
{
"category": "external",
"summary": "427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "429821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=429821"
},
{
"category": "external",
"summary": "443928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=443928"
},
{
"category": "external",
"summary": "451615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=451615"
},
{
"category": "external",
"summary": "457597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457597"
},
{
"category": "external",
"summary": "457934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457934"
},
{
"category": "external",
"summary": "458250",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458250"
},
{
"category": "external",
"summary": "493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "503928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503928"
},
{
"category": "external",
"summary": "503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "504390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504390"
},
{
"category": "external",
"summary": "504555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504555"
},
{
"category": "external",
"summary": "504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "external",
"summary": "509125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"category": "external",
"summary": "515698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515698"
},
{
"category": "external",
"summary": "521619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521619"
},
{
"category": "external",
"summary": "522209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=522209"
},
{
"category": "external",
"summary": "570171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=570171"
},
{
"category": "external",
"summary": "596426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=596426"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0602.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Certificate System 7.3 security update",
"tracking": {
"current_release_date": "2026-01-28T22:51:16+00:00",
"generator": {
"date": "2026-01-28T22:51:16+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.16"
}
},
"id": "RHSA-2010:0602",
"initial_release_date": "2010-08-04T21:30:00+00:00",
"revision_history": [
{
"date": "2010-08-04T21:30:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2010-08-05T10:04:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-28T22:51:16+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Certificate System 7.3 for 4AS",
"product": {
"name": "Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:certificate_system:7.3"
}
}
},
{
"category": "product_name",
"name": "Red Hat Certificate System 7.3 for 4ES",
"product": {
"name": "Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:certificate_system:7.3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Certificate System"
},
{
"branches": [
{
"category": "product_version",
"name": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"product": {
"name": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"product_id": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.3.02-2jpp_1rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "xml-commons-0:1.3.02-2jpp_1rh.noarch",
"product": {
"name": "xml-commons-0:1.3.02-2jpp_1rh.noarch",
"product_id": "xml-commons-0:1.3.02-2jpp_1rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons@1.3.02-2jpp_1rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"product": {
"name": "xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"product_id": "xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.7.1-1jpp_1rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ant-0:1.6.5-1jpp_1rh.noarch",
"product": {
"name": "ant-0:1.6.5-1jpp_1rh.noarch",
"product_id": "ant-0:1.6.5-1jpp_1rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ant@1.6.5-1jpp_1rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "avalon-logkit-0:1.2-2jpp_4rh.noarch",
"product": {
"name": "avalon-logkit-0:1.2-2jpp_4rh.noarch",
"product_id": "avalon-logkit-0:1.2-2jpp_4rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/avalon-logkit@1.2-2jpp_4rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "axis-0:1.2.1-1jpp_3rh.noarch",
"product": {
"name": "axis-0:1.2.1-1jpp_3rh.noarch",
"product_id": "axis-0:1.2.1-1jpp_3rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/axis@1.2.1-1jpp_3rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"product": {
"name": "classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"product_id": "classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/classpathx-jaf@1.0-2jpp_6rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"product": {
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"product_id": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/classpathx-mail@1.1.1-2jpp_8rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "log4j-0:1.2.12-1jpp_1rh.noarch",
"product": {
"name": "log4j-0:1.2.12-1jpp_1rh.noarch",
"product_id": "log4j-0:1.2.12-1jpp_1rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/log4j@1.2.12-1jpp_1rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "mx4j-1:3.0.1-1jpp_4rh.noarch",
"product": {
"name": "mx4j-1:3.0.1-1jpp_4rh.noarch",
"product_id": "mx4j-1:3.0.1-1jpp_4rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mx4j@3.0.1-1jpp_4rh?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"product": {
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"product_id": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-modeler@2.0-3jpp_2rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product_id": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp_4rh.16?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhpki-manage-0:7.3.0-19.el4.noarch",
"product": {
"name": "rhpki-manage-0:7.3.0-19.el4.noarch",
"product_id": "rhpki-manage-0:7.3.0-19.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-manage@7.3.0-19.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhpki-ca-0:7.3.0-20.el4.noarch",
"product": {
"name": "rhpki-ca-0:7.3.0-20.el4.noarch",
"product_id": "rhpki-ca-0:7.3.0-20.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-ca@7.3.0-20.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhpki-kra-0:7.3.0-14.el4.noarch",
"product": {
"name": "rhpki-kra-0:7.3.0-14.el4.noarch",
"product_id": "rhpki-kra-0:7.3.0-14.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-kra@7.3.0-14.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhpki-tks-0:7.3.0-13.el4.noarch",
"product": {
"name": "rhpki-tks-0:7.3.0-13.el4.noarch",
"product_id": "rhpki-tks-0:7.3.0-13.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-tks@7.3.0-13.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhpki-ocsp-0:7.3.0-13.el4.noarch",
"product": {
"name": "rhpki-ocsp-0:7.3.0-13.el4.noarch",
"product_id": "rhpki-ocsp-0:7.3.0-13.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-ocsp@7.3.0-13.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rhpki-java-tools-0:7.3.0-10.el4.noarch",
"product": {
"name": "rhpki-java-tools-0:7.3.0-10.el4.noarch",
"product_id": "rhpki-java-tools-0:7.3.0-10.el4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-java-tools@7.3.0-10.el4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-specs@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-jms-1.1-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-jta-1.0.1B-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-j2ee-deployment-1.1-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-ejb-2.1-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-servlet-2.4-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-specs-javadoc@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-j2ee-1.4-apis@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-j2ee-connector-1.5-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-jsp-2.0-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product": {
"name": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_id": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-j2ee-management-1.0-api@1.0-0.M4.1jpp_10rh?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "xml-commons-0:1.3.02-2jpp_1rh.src",
"product": {
"name": "xml-commons-0:1.3.02-2jpp_1rh.src",
"product_id": "xml-commons-0:1.3.02-2jpp_1rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons@1.3.02-2jpp_1rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-0:2.7.1-1jpp_1rh.src",
"product": {
"name": "xerces-j2-0:2.7.1-1jpp_1rh.src",
"product_id": "xerces-j2-0:2.7.1-1jpp_1rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.7.1-1jpp_1rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "ant-0:1.6.5-1jpp_1rh.src",
"product": {
"name": "ant-0:1.6.5-1jpp_1rh.src",
"product_id": "ant-0:1.6.5-1jpp_1rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ant@1.6.5-1jpp_1rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "avalon-logkit-0:1.2-2jpp_4rh.src",
"product": {
"name": "avalon-logkit-0:1.2-2jpp_4rh.src",
"product_id": "avalon-logkit-0:1.2-2jpp_4rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/avalon-logkit@1.2-2jpp_4rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "axis-0:1.2.1-1jpp_3rh.src",
"product": {
"name": "axis-0:1.2.1-1jpp_3rh.src",
"product_id": "axis-0:1.2.1-1jpp_3rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/axis@1.2.1-1jpp_3rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "classpathx-jaf-0:1.0-2jpp_6rh.src",
"product": {
"name": "classpathx-jaf-0:1.0-2jpp_6rh.src",
"product_id": "classpathx-jaf-0:1.0-2jpp_6rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/classpathx-jaf@1.0-2jpp_6rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.src",
"product": {
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.src",
"product_id": "classpathx-mail-0:1.1.1-2jpp_8rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/classpathx-mail@1.1.1-2jpp_8rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "log4j-0:1.2.12-1jpp_1rh.src",
"product": {
"name": "log4j-0:1.2.12-1jpp_1rh.src",
"product_id": "log4j-0:1.2.12-1jpp_1rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/log4j@1.2.12-1jpp_1rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "mx4j-1:3.0.1-1jpp_4rh.src",
"product": {
"name": "mx4j-1:3.0.1-1jpp_4rh.src",
"product_id": "mx4j-1:3.0.1-1jpp_4rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mx4j@3.0.1-1jpp_4rh?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"product": {
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"product_id": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-modeler@2.0-3jpp_2rh?arch=src"
}
}
},
{
"category": "product_version",
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"product": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"product_id": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp_4rh.16?arch=src"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-0:1.3.3-3.el4.src",
"product": {
"name": "pcsc-lite-0:1.3.3-3.el4.src",
"product_id": "pcsc-lite-0:1.3.3-3.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite@1.3.3-3.el4?arch=src"
}
}
},
{
"category": "product_version",
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"product": {
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"product_id": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/geronimo-specs@1.0-0.M4.1jpp_10rh?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"product": {
"name": "rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"product_id": "rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-native-tools@7.3.0-6.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"product": {
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"product_id": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite-debuginfo@1.3.3-3.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"product": {
"name": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"product_id": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite-doc@1.3.3-3.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-0:1.3.3-3.el4.x86_64",
"product": {
"name": "pcsc-lite-0:1.3.3-3.el4.x86_64",
"product_id": "pcsc-lite-0:1.3.3-3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite@1.3.3-3.el4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"product": {
"name": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"product_id": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite-libs@1.3.3-3.el4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhpki-native-tools-0:7.3.0-6.el4.i386",
"product": {
"name": "rhpki-native-tools-0:7.3.0-6.el4.i386",
"product_id": "rhpki-native-tools-0:7.3.0-6.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhpki-native-tools@7.3.0-6.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"product": {
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"product_id": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite-debuginfo@1.3.3-3.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-doc-0:1.3.3-3.el4.i386",
"product": {
"name": "pcsc-lite-doc-0:1.3.3-3.el4.i386",
"product_id": "pcsc-lite-doc-0:1.3.3-3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite-doc@1.3.3-3.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-0:1.3.3-3.el4.i386",
"product": {
"name": "pcsc-lite-0:1.3.3-3.el4.i386",
"product_id": "pcsc-lite-0:1.3.3-3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite@1.3.3-3.el4?arch=i386"
}
}
},
{
"category": "product_version",
"name": "pcsc-lite-libs-0:1.3.3-3.el4.i386",
"product": {
"name": "pcsc-lite-libs-0:1.3.3-3.el4.i386",
"product_id": "pcsc-lite-libs-0:1.3.3-3.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pcsc-lite-libs@1.3.3-3.el4?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ant-0:1.6.5-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch"
},
"product_reference": "ant-0:1.6.5-1jpp_1rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ant-0:1.6.5-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src"
},
"product_reference": "ant-0:1.6.5-1jpp_1rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "avalon-logkit-0:1.2-2jpp_4rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch"
},
"product_reference": "avalon-logkit-0:1.2-2jpp_4rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "avalon-logkit-0:1.2-2jpp_4rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src"
},
"product_reference": "avalon-logkit-0:1.2-2jpp_4rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "axis-0:1.2.1-1jpp_3rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch"
},
"product_reference": "axis-0:1.2.1-1jpp_3rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "axis-0:1.2.1-1jpp_3rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src"
},
"product_reference": "axis-0:1.2.1-1jpp_3rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-jaf-0:1.0-2jpp_6rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch"
},
"product_reference": "classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-jaf-0:1.0-2jpp_6rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src"
},
"product_reference": "classpathx-jaf-0:1.0-2jpp_6rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch"
},
"product_reference": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src"
},
"product_reference": "classpathx-mail-0:1.1.1-2jpp_8rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src"
},
"product_reference": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch"
},
"product_reference": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src"
},
"product_reference": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-0:1.2.12-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch"
},
"product_reference": "log4j-0:1.2.12-1jpp_1rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-0:1.2.12-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src"
},
"product_reference": "log4j-0:1.2.12-1jpp_1rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mx4j-1:3.0.1-1jpp_4rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch"
},
"product_reference": "mx4j-1:3.0.1-1jpp_4rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mx4j-1:3.0.1-1jpp_4rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src"
},
"product_reference": "mx4j-1:3.0.1-1jpp_4rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-0:1.3.3-3.el4.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src"
},
"product_reference": "pcsc-lite-0:1.3.3-3.el4.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-doc-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-doc-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-libs-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-libs-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-ca-0:7.3.0-20.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch"
},
"product_reference": "rhpki-ca-0:7.3.0-20.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-java-tools-0:7.3.0-10.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch"
},
"product_reference": "rhpki-java-tools-0:7.3.0-10.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-kra-0:7.3.0-14.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch"
},
"product_reference": "rhpki-kra-0:7.3.0-14.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-manage-0:7.3.0-19.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch"
},
"product_reference": "rhpki-manage-0:7.3.0-19.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-native-tools-0:7.3.0-6.el4.i386 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386"
},
"product_reference": "rhpki-native-tools-0:7.3.0-6.el4.i386",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-native-tools-0:7.3.0-6.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64"
},
"product_reference": "rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-ocsp-0:7.3.0-13.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch"
},
"product_reference": "rhpki-ocsp-0:7.3.0-13.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-tks-0:7.3.0-13.el4.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch"
},
"product_reference": "rhpki-tks-0:7.3.0-13.el4.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch"
},
"product_reference": "xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src"
},
"product_reference": "xerces-j2-0:2.7.1-1jpp_1rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-0:1.3.02-2jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch"
},
"product_reference": "xml-commons-0:1.3.02-2jpp_1rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-0:1.3.02-2jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src"
},
"product_reference": "xml-commons-0:1.3.02-2jpp_1rh.src",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4AS",
"product_id": "4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
},
"product_reference": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"relates_to_product_reference": "4AS-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ant-0:1.6.5-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch"
},
"product_reference": "ant-0:1.6.5-1jpp_1rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ant-0:1.6.5-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src"
},
"product_reference": "ant-0:1.6.5-1jpp_1rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "avalon-logkit-0:1.2-2jpp_4rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch"
},
"product_reference": "avalon-logkit-0:1.2-2jpp_4rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "avalon-logkit-0:1.2-2jpp_4rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src"
},
"product_reference": "avalon-logkit-0:1.2-2jpp_4rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "axis-0:1.2.1-1jpp_3rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch"
},
"product_reference": "axis-0:1.2.1-1jpp_3rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "axis-0:1.2.1-1jpp_3rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src"
},
"product_reference": "axis-0:1.2.1-1jpp_3rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-jaf-0:1.0-2jpp_6rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch"
},
"product_reference": "classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-jaf-0:1.0-2jpp_6rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src"
},
"product_reference": "classpathx-jaf-0:1.0-2jpp_6rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch"
},
"product_reference": "classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "classpathx-mail-0:1.1.1-2jpp_8rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src"
},
"product_reference": "classpathx-mail-0:1.1.1-2jpp_8rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src"
},
"product_reference": "geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch"
},
"product_reference": "geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch"
},
"product_reference": "jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src"
},
"product_reference": "jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-0:1.2.12-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch"
},
"product_reference": "log4j-0:1.2.12-1jpp_1rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "log4j-0:1.2.12-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src"
},
"product_reference": "log4j-0:1.2.12-1jpp_1rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mx4j-1:3.0.1-1jpp_4rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch"
},
"product_reference": "mx4j-1:3.0.1-1jpp_4rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mx4j-1:3.0.1-1jpp_4rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src"
},
"product_reference": "mx4j-1:3.0.1-1jpp_4rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-0:1.3.3-3.el4.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src"
},
"product_reference": "pcsc-lite-0:1.3.3-3.el4.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-doc-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-doc-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-libs-0:1.3.3-3.el4.i386 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386"
},
"product_reference": "pcsc-lite-libs-0:1.3.3-3.el4.i386",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64"
},
"product_reference": "pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-ca-0:7.3.0-20.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch"
},
"product_reference": "rhpki-ca-0:7.3.0-20.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-java-tools-0:7.3.0-10.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch"
},
"product_reference": "rhpki-java-tools-0:7.3.0-10.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-kra-0:7.3.0-14.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch"
},
"product_reference": "rhpki-kra-0:7.3.0-14.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-manage-0:7.3.0-19.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch"
},
"product_reference": "rhpki-manage-0:7.3.0-19.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-native-tools-0:7.3.0-6.el4.i386 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386"
},
"product_reference": "rhpki-native-tools-0:7.3.0-6.el4.i386",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-native-tools-0:7.3.0-6.el4.x86_64 as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64"
},
"product_reference": "rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-ocsp-0:7.3.0-13.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch"
},
"product_reference": "rhpki-ocsp-0:7.3.0-13.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhpki-tks-0:7.3.0-13.el4.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch"
},
"product_reference": "rhpki-tks-0:7.3.0-13.el4.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-0:5.5.23-0jpp_4rh.16.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src"
},
"product_reference": "tomcat5-0:5.5.23-0jpp_4rh.16.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch"
},
"product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-1jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch"
},
"product_reference": "xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-0:2.7.1-1jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src"
},
"product_reference": "xerces-j2-0:2.7.1-1jpp_1rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-0:1.3.02-2jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch"
},
"product_reference": "xml-commons-0:1.3.02-2jpp_1rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-0:1.3.02-2jpp_1rh.src as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src"
},
"product_reference": "xml-commons-0:1.3.02-2jpp_1rh.src",
"relates_to_product_reference": "4ES-CERT-7.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch as a component of Red Hat Certificate System 7.3 for 4ES",
"product_id": "4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
},
"product_reference": "xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"relates_to_product_reference": "4ES-CERT-7.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2005-2090",
"discovery_date": "2005-06-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "237079"
}
],
"notes": [
{
"category": "description",
"text": "Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a \"Transfer-Encoding: chunked\" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka \"HTTP Request Smuggling.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat multiple content-length header poisioning",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-2090"
},
{
"category": "external",
"summary": "RHBZ#237079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237079"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-2090",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2090"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2090",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2090"
}
],
"release_date": "2005-06-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat multiple content-length header poisioning"
},
{
"cve": "CVE-2005-3510",
"discovery_date": "2005-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "237085"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 5.5.0 to 5.5.11 allows remote attackers to cause a denial of service (CPU consumption) via a large number of simultaneous requests to list a web directory that has a large number of files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat DoS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2005-3510"
},
{
"category": "external",
"summary": "RHBZ#237085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237085"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2005-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-3510"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3510",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3510"
}
],
"release_date": "2005-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "tomcat DoS"
},
{
"cve": "CVE-2006-3835",
"discovery_date": "2006-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "237084"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 5 before 5.5.17 allows remote attackers to list directories via a semicolon (;) preceding a filename with a mapped extension, as demonstrated by URLs ending with /;index.jsp and /;help.do.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat directory listing issue",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is not a security issue in Tomcat itself, but is caused when directory listings are enabled.\n\nDetails on how to disable directory listings are available at: http://tomcat.apache.org/faq/misc.html#listing",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3835"
},
{
"category": "external",
"summary": "RHBZ#237084",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237084"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3835",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3835"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3835",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3835"
}
],
"release_date": "2006-07-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat directory listing issue"
},
{
"cve": "CVE-2006-3918",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2006-07-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "200732"
}
],
"notes": [
{
"category": "description",
"text": "http_protocol.c in (1) IBM HTTP Server 6.0 before 6.0.2.13 and 6.1 before 6.1.0.1, and (2) Apache HTTP Server 1.3 before 1.3.35, 2.0 before 2.0.58, and 2.2 before 2.2.2, does not sanitize the Expect header from an HTTP request when it is reflected back in an error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated using a Flash SWF file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: Expect header XSS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-3918"
},
{
"category": "external",
"summary": "RHBZ#200732",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=200732"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-3918",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3918"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-3918",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-3918"
}
],
"release_date": "2006-05-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: Expect header XSS"
},
{
"cve": "CVE-2006-5752",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2007-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "245112"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in mod_status.c in the mod_status module in Apache HTTP Server (httpd), when ExtendedStatus is enabled and a public server-status page is used, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving charsets with browsers that perform \"charset detection\" when the content-type is not specified.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd mod_status XSS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-5752"
},
{
"category": "external",
"summary": "RHBZ#245112",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245112"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5752"
}
],
"release_date": "2007-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd mod_status XSS"
},
{
"cve": "CVE-2007-0450",
"discovery_date": "2007-03-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "237080"
}
],
"notes": [
{
"category": "description",
"text": "Directory traversal vulnerability in Apache HTTP Server and Tomcat 5.x before 5.5.22 and 6.x before 6.0.10, when using certain proxy modules (mod_proxy, mod_rewrite, mod_jk), allows remote attackers to read arbitrary files via a .. (dot dot) sequence with combinations of (1) \"/\" (slash), (2) \"\\\" (backslash), and (3) URL-encoded backslash (%5C) characters in the URL, which are valid separators in Tomcat but not in Apache.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat directory traversal",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-0450"
},
{
"category": "external",
"summary": "RHBZ#237080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=237080"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0450"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0450",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0450"
}
],
"release_date": "2007-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat directory traversal"
},
{
"cve": "CVE-2007-1349",
"discovery_date": "2007-05-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "240423"
}
],
"notes": [
{
"category": "description",
"text": "PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_perl PerlRun denial of service",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1349"
},
{
"category": "external",
"summary": "RHBZ#240423",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=240423"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1349",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1349"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1349",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1349"
}
],
"release_date": "2007-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "mod_perl PerlRun denial of service"
},
{
"cve": "CVE-2007-1358",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2007-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "244803"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted \"Accept-Language headers that do not conform to RFC 2616\".",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat accept-language xss flaw",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1358"
},
{
"category": "external",
"summary": "RHBZ#244803",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=244803"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1358",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1358"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1358",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1358"
}
],
"release_date": "2007-06-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat accept-language xss flaw"
},
{
"cve": "CVE-2007-1863",
"discovery_date": "2007-05-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "244658"
}
],
"notes": [
{
"category": "description",
"text": "cache_util.c in the mod_cache module in Apache HTTP Server (httpd), when caching is enabled and a threaded Multi-Processing Module (MPM) is used, allows remote attackers to cause a denial of service (child processing handler crash) via a request with the (1) s-maxage, (2) max-age, (3) min-fresh, or (4) max-stale Cache-Control headers without a value.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd mod_cache segfault",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1863"
},
{
"category": "external",
"summary": "RHBZ#244658",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=244658"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1863",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1863"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1863",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1863"
}
],
"release_date": "2007-05-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd mod_cache segfault"
},
{
"cve": "CVE-2007-3304",
"discovery_date": "2007-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "245111"
}
],
"notes": [
{
"category": "description",
"text": "Apache httpd 1.3.37, 2.0.59, and 2.2.4 with the Prefork MPM module, allows local users to cause a denial of service by modifying the worker_score and process_score arrays to reference an arbitrary process ID, which is sent a SIGUSR1 signal from the master process, aka \"SIGUSR1 killer.\"",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd scoreboard lack of PID protection",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3304"
},
{
"category": "external",
"summary": "RHBZ#245111",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245111"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3304",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3304"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3304",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3304"
}
],
"release_date": "2007-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd scoreboard lack of PID protection"
},
{
"cve": "CVE-2007-3382",
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "247972"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes (\"\u0027\") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat handling of cookies",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3382"
},
{
"category": "external",
"summary": "RHBZ#247972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247972"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3382",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3382"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3382",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3382"
}
],
"release_date": "2007-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat handling of cookies"
},
{
"cve": "CVE-2007-3385",
"discovery_date": "2007-07-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "247976"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \\\" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat handling of cookie values",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3385"
},
{
"category": "external",
"summary": "RHBZ#247976",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247976"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3385",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3385"
}
],
"release_date": "2007-08-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat handling of cookie values"
},
{
"cve": "CVE-2007-3847",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2007-08-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "250731"
}
],
"notes": [
{
"category": "description",
"text": "The date handling code in modules/proxy/proxy_util.c (mod_proxy) in Apache 2.3.0, when using a threaded MPM, allows remote origin servers to cause a denial of service (caching forward proxy process crash) via crafted date headers that trigger a buffer over-read.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: out of bounds read",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3847"
},
{
"category": "external",
"summary": "RHBZ#250731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250731"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3847",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3847"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3847",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3847"
}
],
"release_date": "2007-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: out of bounds read"
},
{
"cve": "CVE-2007-4465",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2007-09-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "289511"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in mod_autoindex.c in the Apache HTTP Server before 2.2.6, when the charset on a server-generated page is not defined, allows remote attackers to inject arbitrary web script or HTML via the P parameter using the UTF-7 charset. NOTE: it could be argued that this issue is due to a design limitation of browsers that attempt to perform automatic content type detection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_autoindex XSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is actually a flaw in browsers that do not derive the response character set as required by RFC 2616. This does not affect the default configuration of Apache httpd in Red Hat products and will only affect customers who have removed the \"AddDefaultCharset\" directive and are using directory indexes. The Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-4465"
},
{
"category": "external",
"summary": "RHBZ#289511",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=289511"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-4465",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4465"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4465",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4465"
}
],
"release_date": "2007-09-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mod_autoindex XSS"
},
{
"cve": "CVE-2007-5000",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2007-12-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "419931"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in the (1) mod_imap module in the Apache HTTP Server 1.3.0 through 1.3.39 and 2.0.35 through 2.0.61 and the (2) mod_imagemap module in the Apache HTTP Server 2.2.0 through 2.2.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_imagemap XSS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5000"
},
{
"category": "external",
"summary": "RHBZ#419931",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=419931"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5000",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5000"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5000",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5000"
}
],
"release_date": "2007-12-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: mod_imagemap XSS"
},
{
"acknowledgments": [
{
"names": [
"Tavis Ormandy",
"Will Drewry"
]
}
],
"cve": "CVE-2007-5116",
"discovery_date": "2007-09-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "323571"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "perl regular expression UTF parsing errors",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5116"
},
{
"category": "external",
"summary": "RHBZ#323571",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=323571"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5116",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5116"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5116",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5116"
}
],
"release_date": "2007-11-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "perl regular expression UTF parsing errors"
},
{
"cve": "CVE-2007-5333",
"discovery_date": "2008-01-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427766"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (\") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Improve cookie parsing for tomcat5",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5333\n\nThe Red Hat Product Security has rated this issue as having low security impact, a future update may address this flaw.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5333"
},
{
"category": "external",
"summary": "RHBZ#427766",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427766"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5333",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5333"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5333"
}
],
"release_date": "2008-02-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Improve cookie parsing for tomcat5"
},
{
"cve": "CVE-2007-5461",
"discovery_date": "2007-10-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "333791"
}
],
"notes": [
{
"category": "description",
"text": "Absolute path traversal vulnerability in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0, 5.0.0, 5.5.0 through 5.5.25, and 6.0.0 through 6.0.14, under certain configurations, allows remote authenticated users to read arbitrary files via a WebDAV write request that specifies an entity with a SYSTEM tag.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Absolute path traversal Apache Tomcat WEBDAV",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-5461"
},
{
"category": "external",
"summary": "RHBZ#333791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=333791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5461"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5461"
}
],
"release_date": "2007-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Absolute path traversal Apache Tomcat WEBDAV"
},
{
"cve": "CVE-2007-6388",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2008-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427228"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in mod_status in the Apache HTTP Server 2.2.0 through 2.2.6, 2.0.35 through 2.0.61, and 1.3.2 through 1.3.39, when the server-status page is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apache mod_status cross-site scripting",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-6388"
},
{
"category": "external",
"summary": "RHBZ#427228",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427228"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-6388",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6388"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-6388",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-6388"
}
],
"release_date": "2007-12-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apache mod_status cross-site scripting"
},
{
"cve": "CVE-2008-0005",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2008-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427739"
}
],
"notes": [
{
"category": "description",
"text": "mod_proxy_ftp in Apache 2.2.x before 2.2.7-dev, 2.0.x before 2.0.62-dev, and 1.3.x before 1.3.40-dev does not define a charset, which allows remote attackers to conduct cross-site scripting (XSS) attacks using UTF-7 encoding.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "mod_proxy_ftp XSS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0005"
},
{
"category": "external",
"summary": "RHBZ#427739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427739"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0005",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0005"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0005",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0005"
}
],
"release_date": "2008-01-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "mod_proxy_ftp XSS"
},
{
"cve": "CVE-2008-0128",
"discovery_date": "2008-01-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "429821"
}
],
"notes": [
{
"category": "description",
"text": "The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat5 SSO cookie login information disclosure",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-0128"
},
{
"category": "external",
"summary": "RHBZ#429821",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=429821"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-0128",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0128"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-0128",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-0128"
}
],
"release_date": "2006-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat5 SSO cookie login information disclosure"
},
{
"cve": "CVE-2008-1232",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2008-08-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457597"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat: Cross-Site-Scripting enabled by sendError call",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1232"
},
{
"category": "external",
"summary": "RHBZ#457597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457597"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1232",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1232"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1232",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1232"
}
],
"release_date": "2008-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat: Cross-Site-Scripting enabled by sendError call"
},
{
"cve": "CVE-2008-1927",
"discovery_date": "2008-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "443928"
}
],
"notes": [
{
"category": "description",
"text": "Double free vulnerability in Perl 5.8.8 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a crafted regular expression containing UTF8 characters. NOTE: this issue might only be present on certain operating systems.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "perl: heap corruption by regular expressions with utf8 characters",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-1927"
},
{
"category": "external",
"summary": "RHBZ#443928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=443928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-1927",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-1927"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-1927",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1927"
}
],
"release_date": "2007-12-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "perl: heap corruption by regular expressions with utf8 characters"
},
{
"cve": "CVE-2008-2364",
"discovery_date": "2008-05-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "451615"
}
],
"notes": [
{
"category": "description",
"text": "The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_proxy_http DoS via excessive interim responses from the origin server",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-2364\n\nThe Red Hat Product Security has rated this issue as having moderate security impact, a future update may address this flaw. More information regarding issue severity can be found here: https://access.redhat.com/security/updates/classification/",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2364"
},
{
"category": "external",
"summary": "RHBZ#451615",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=451615"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2364",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2364"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2364",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2364"
}
],
"release_date": "2008-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "httpd: mod_proxy_http DoS via excessive interim responses from the origin server"
},
{
"cve": "CVE-2008-2370",
"discovery_date": "2008-08-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "457934"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat RequestDispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2370"
},
{
"category": "external",
"summary": "RHBZ#457934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=457934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2370"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2370",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2370"
}
],
"release_date": "2008-08-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat RequestDispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2008-2939",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2008-08-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "458250"
}
],
"notes": [
{
"category": "description",
"text": "Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_proxy_ftp globbing XSS",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-2939"
},
{
"category": "external",
"summary": "RHBZ#458250",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=458250"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-2939",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2939"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2939",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2939"
}
],
"release_date": "2008-08-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: mod_proxy_ftp globbing XSS"
},
{
"cve": "CVE-2008-5515",
"discovery_date": "2009-06-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504753"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat request dispatcher information disclosure vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2008-5515"
},
{
"category": "external",
"summary": "RHBZ#504753",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504753"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2008-5515",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5515"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5515"
}
],
"release_date": "2009-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat request dispatcher information disclosure vulnerability"
},
{
"cve": "CVE-2009-0023",
"discovery_date": "2009-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503928"
}
],
"notes": [
{
"category": "description",
"text": "The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apr-util heap buffer underwrite",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0023"
},
{
"category": "external",
"summary": "RHBZ#503928",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503928"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0023",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0023"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0023",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0023"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apr-util heap buffer underwrite"
},
{
"cve": "CVE-2009-0033",
"discovery_date": "2009-01-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "493381"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Denial-Of-Service with AJP connection",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0033"
},
{
"category": "external",
"summary": "RHBZ#493381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=493381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0033"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0033"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "tomcat6 Denial-Of-Service with AJP connection"
},
{
"cve": "CVE-2009-0580",
"discovery_date": "2009-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "503978"
}
],
"notes": [
{
"category": "description",
"text": "Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "tomcat6 Information disclosure in authentication classes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-0580"
},
{
"category": "external",
"summary": "RHBZ#503978",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=503978"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-0580",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0580"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0580"
}
],
"release_date": "2009-06-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "tomcat6 Information disclosure in authentication classes"
},
{
"cve": "CVE-2009-1891",
"discovery_date": "2009-06-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "509125"
}
],
"notes": [
{
"category": "description",
"text": "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: possible temporary DoS (CPU consumption) in mod_deflate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1891"
},
{
"category": "external",
"summary": "RHBZ#509125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891"
}
],
"release_date": "2009-06-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: possible temporary DoS (CPU consumption) in mod_deflate"
},
{
"cve": "CVE-2009-1955",
"discovery_date": "2009-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504555"
}
],
"notes": [
{
"category": "description",
"text": "The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apr-util billion laughs attack",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1955"
},
{
"category": "external",
"summary": "RHBZ#504555",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504555"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1955",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1955"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1955",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1955"
}
],
"release_date": "2009-06-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apr-util billion laughs attack"
},
{
"cve": "CVE-2009-1956",
"discovery_date": "2009-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "504390"
}
],
"notes": [
{
"category": "description",
"text": "Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apr-util single NULL byte buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1956"
},
{
"category": "external",
"summary": "RHBZ#504390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=504390"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1956",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1956"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1956",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1956"
}
],
"release_date": "2009-04-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apr-util single NULL byte buffer overflow"
},
{
"cve": "CVE-2009-2412",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2009-07-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "515698"
}
],
"notes": [
{
"category": "description",
"text": "Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "apr-util: Integer overflows in memory pool (apr) and relocatable memory (apr-util) management",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-2412"
},
{
"category": "external",
"summary": "RHBZ#515698",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=515698"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2412"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2412",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2412"
}
],
"release_date": "2009-08-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "apr-util: Integer overflows in memory pool (apr) and relocatable memory (apr-util) management"
},
{
"cve": "CVE-2009-3094",
"discovery_date": "2009-09-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "521619"
}
],
"notes": [
{
"category": "description",
"text": "The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: NULL pointer defer in mod_proxy_ftp caused by crafted EPSV and PASV reply",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3094"
},
{
"category": "external",
"summary": "RHBZ#521619",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=521619"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3094"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3094",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3094"
}
],
"release_date": "2009-09-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: NULL pointer defer in mod_proxy_ftp caused by crafted EPSV and PASV reply"
},
{
"cve": "CVE-2009-3095",
"discovery_date": "2009-09-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "522209"
}
],
"notes": [
{
"category": "description",
"text": "The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_proxy_ftp FTP command injection via Authorization HTTP header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-3095"
},
{
"category": "external",
"summary": "RHBZ#522209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=522209"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-3095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3095"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3095",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3095"
}
],
"release_date": "2009-09-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: mod_proxy_ftp FTP command injection via Authorization HTTP header"
},
{
"cve": "CVE-2009-4901",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2010-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "596426"
}
],
"notes": [
{
"category": "description",
"text": "The MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 might allow local users to cause a denial of service (daemon crash) via crafted SCARD_SET_ATTRIB message data, which is improperly demarshalled and triggers a buffer over-read, a related issue to CVE-2010-0407.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pcsc-lite: Privilege escalation via specially-crafted client to PC/SC Smart Card daemon messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-4901"
},
{
"category": "external",
"summary": "RHBZ#596426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=596426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-4901",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4901"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4901",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4901"
}
],
"release_date": "2010-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pcsc-lite: Privilege escalation via specially-crafted client to PC/SC Smart Card daemon messages"
},
{
"cve": "CVE-2010-0407",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2010-05-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "596426"
}
],
"notes": [
{
"category": "description",
"text": "Multiple buffer overflows in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 allow local users to gain privileges via crafted message data, which is improperly demarshalled.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pcsc-lite: Privilege escalation via specially-crafted client to PC/SC Smart Card daemon messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-0407"
},
{
"category": "external",
"summary": "RHBZ#596426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=596426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-0407",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0407"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0407",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0407"
}
],
"release_date": "2010-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pcsc-lite: Privilege escalation via specially-crafted client to PC/SC Smart Card daemon messages"
},
{
"cve": "CVE-2010-0434",
"discovery_date": "2010-03-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "570171"
}
],
"notes": [
{
"category": "description",
"text": "The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: request header information leak",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2010-0434"
},
{
"category": "external",
"summary": "RHBZ#570171",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=570171"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2010-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0434"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-0434",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2010-0434"
}
],
"release_date": "2009-12-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2010-08-04T21:30:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2010:0602"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4AS-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4AS-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4AS-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4AS-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4AS-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4AS-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4AS-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4AS-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4AS-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4AS-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4AS-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4AS-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4AS-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4AS-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4AS-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4AS-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4AS-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4AS-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4AS-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4AS-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4AS-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4AS-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.noarch",
"4ES-CERT-7.3:ant-0:1.6.5-1jpp_1rh.src",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.noarch",
"4ES-CERT-7.3:avalon-logkit-0:1.2-2jpp_4rh.src",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.noarch",
"4ES-CERT-7.3:axis-0:1.2.1-1jpp_3rh.src",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.noarch",
"4ES-CERT-7.3:classpathx-jaf-0:1.0-2jpp_6rh.src",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.noarch",
"4ES-CERT-7.3:classpathx-mail-0:1.1.1-2jpp_8rh.src",
"4ES-CERT-7.3:geronimo-ejb-2.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-1.4-apis-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-connector-1.5-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-deployment-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-j2ee-management-1.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jms-1.1-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jsp-2.0-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-jta-1.0.1B-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-servlet-2.4-api-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:geronimo-specs-0:1.0-0.M4.1jpp_10rh.src",
"4ES-CERT-7.3:geronimo-specs-javadoc-0:1.0-0.M4.1jpp_10rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.noarch",
"4ES-CERT-7.3:jakarta-commons-modeler-0:2.0-3jpp_2rh.src",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.noarch",
"4ES-CERT-7.3:log4j-0:1.2.12-1jpp_1rh.src",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.noarch",
"4ES-CERT-7.3:mx4j-1:3.0.1-1jpp_4rh.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.src",
"4ES-CERT-7.3:pcsc-lite-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-debuginfo-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-doc-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.i386",
"4ES-CERT-7.3:pcsc-lite-libs-0:1.3.3-3.el4.x86_64",
"4ES-CERT-7.3:rhpki-ca-0:7.3.0-20.el4.noarch",
"4ES-CERT-7.3:rhpki-java-tools-0:7.3.0-10.el4.noarch",
"4ES-CERT-7.3:rhpki-kra-0:7.3.0-14.el4.noarch",
"4ES-CERT-7.3:rhpki-manage-0:7.3.0-19.el4.noarch",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.i386",
"4ES-CERT-7.3:rhpki-native-tools-0:7.3.0-6.el4.x86_64",
"4ES-CERT-7.3:rhpki-ocsp-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:rhpki-tks-0:7.3.0-13.el4.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-0:5.5.23-0jpp_4rh.16.src",
"4ES-CERT-7.3:tomcat5-common-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jasper-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-jsp-2.0-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-server-lib-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:tomcat5-servlet-2.4-api-0:5.5.23-0jpp_4rh.16.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.noarch",
"4ES-CERT-7.3:xerces-j2-0:2.7.1-1jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.noarch",
"4ES-CERT-7.3:xml-commons-0:1.3.02-2jpp_1rh.src",
"4ES-CERT-7.3:xml-commons-apis-0:1.3.02-2jpp_1rh.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: request header information leak"
}
]
}
RHSA-2009:1156
Vulnerability from csaf_redhat - Published: 2009-07-14 19:07 - Updated: 2025-11-21 17:34The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.
The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated httpd packages that fix multiple security issues are now available\nfor Red Hat Application Stack v2.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Apache HTTP Server is a popular Web server.\n\nA denial of service flaw was found in the Apache mod_proxy module when it\nwas used as a reverse proxy. A remote attacker could use this flaw to force\na proxy process to consume large amounts of CPU time. (CVE-2009-1890)\n\nA denial of service flaw was found in the Apache mod_deflate module. This\nmodule continued to compress large files until compression was complete,\neven if the network connection that requested the content was closed before\ncompression completed. This would cause mod_deflate to consume large\namounts of CPU if mod_deflate was enabled for a large file. (CVE-2009-1891)\n\nA flaw was found in the handling of the \"Options\" and \"AllowOverride\"\ndirectives used by the Apache HTTP Server. In configurations using the\n\"AllowOverride\" directive with certain \"Options=\" arguments, local users\nwere not restricted from executing commands from a Server-Side-Include\nscript as intended. (CVE-2009-1195)\n\nAll httpd users should upgrade to these updated packages, which contain\nbackported patches to correct these issues. After installing the updated\npackages, the httpd daemon must be restarted for the update to take effect.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2009:1156",
"url": "https://access.redhat.com/errata/RHSA-2009:1156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "489436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=489436"
},
{
"category": "external",
"summary": "509125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"category": "external",
"summary": "509375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509375"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1156.json"
}
],
"title": "Red Hat Security Advisory: httpd security update",
"tracking": {
"current_release_date": "2025-11-21T17:34:55+00:00",
"generator": {
"date": "2025-11-21T17:34:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2009:1156",
"initial_release_date": "2009-07-14T19:07:00+00:00",
"revision_history": [
{
"date": "2009-07-14T19:07:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2009-07-14T15:07:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:34:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product": {
"name": "Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_application_stack:2"
}
}
}
],
"category": "product_family",
"name": "Red Hat Application Stack"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-manual-0:2.2.11-3.el5s2.x86_64",
"product": {
"name": "httpd-manual-0:2.2.11-3.el5s2.x86_64",
"product_id": "httpd-manual-0:2.2.11-3.el5s2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.11-3.el5s2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-devel-0:2.2.11-3.el5s2.x86_64",
"product": {
"name": "httpd-devel-0:2.2.11-3.el5s2.x86_64",
"product_id": "httpd-devel-0:2.2.11-3.el5s2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.11-3.el5s2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.11-3.el5s2.x86_64",
"product": {
"name": "httpd-debuginfo-0:2.2.11-3.el5s2.x86_64",
"product_id": "httpd-debuginfo-0:2.2.11-3.el5s2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.11-3.el5s2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.11-3.el5s2.x86_64",
"product": {
"name": "httpd-0:2.2.11-3.el5s2.x86_64",
"product_id": "httpd-0:2.2.11-3.el5s2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.11-3.el5s2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.11-3.el5s2.x86_64",
"product": {
"name": "mod_ssl-1:2.2.11-3.el5s2.x86_64",
"product_id": "mod_ssl-1:2.2.11-3.el5s2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.11-3.el5s2?arch=x86_64\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-devel-0:2.2.11-3.el5s2.i386",
"product": {
"name": "httpd-devel-0:2.2.11-3.el5s2.i386",
"product_id": "httpd-devel-0:2.2.11-3.el5s2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-devel@2.2.11-3.el5s2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-debuginfo-0:2.2.11-3.el5s2.i386",
"product": {
"name": "httpd-debuginfo-0:2.2.11-3.el5s2.i386",
"product_id": "httpd-debuginfo-0:2.2.11-3.el5s2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-debuginfo@2.2.11-3.el5s2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-manual-0:2.2.11-3.el5s2.i386",
"product": {
"name": "httpd-manual-0:2.2.11-3.el5s2.i386",
"product_id": "httpd-manual-0:2.2.11-3.el5s2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd-manual@2.2.11-3.el5s2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "httpd-0:2.2.11-3.el5s2.i386",
"product": {
"name": "httpd-0:2.2.11-3.el5s2.i386",
"product_id": "httpd-0:2.2.11-3.el5s2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.11-3.el5s2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "mod_ssl-1:2.2.11-3.el5s2.i386",
"product": {
"name": "mod_ssl-1:2.2.11-3.el5s2.i386",
"product_id": "mod_ssl-1:2.2.11-3.el5s2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/mod_ssl@2.2.11-3.el5s2?arch=i386\u0026epoch=1"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "httpd-0:2.2.11-3.el5s2.src",
"product": {
"name": "httpd-0:2.2.11-3.el5s2.src",
"product_id": "httpd-0:2.2.11-3.el5s2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/httpd@2.2.11-3.el5s2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.11-3.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:httpd-0:2.2.11-3.el5s2.i386"
},
"product_reference": "httpd-0:2.2.11-3.el5s2.i386",
"relates_to_product_reference": "5Server-Stacks"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.11-3.el5s2.src as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:httpd-0:2.2.11-3.el5s2.src"
},
"product_reference": "httpd-0:2.2.11-3.el5s2.src",
"relates_to_product_reference": "5Server-Stacks"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-0:2.2.11-3.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:httpd-0:2.2.11-3.el5s2.x86_64"
},
"product_reference": "httpd-0:2.2.11-3.el5s2.x86_64",
"relates_to_product_reference": "5Server-Stacks"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.11-3.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:httpd-debuginfo-0:2.2.11-3.el5s2.i386"
},
"product_reference": "httpd-debuginfo-0:2.2.11-3.el5s2.i386",
"relates_to_product_reference": "5Server-Stacks"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-debuginfo-0:2.2.11-3.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:httpd-debuginfo-0:2.2.11-3.el5s2.x86_64"
},
"product_reference": "httpd-debuginfo-0:2.2.11-3.el5s2.x86_64",
"relates_to_product_reference": "5Server-Stacks"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.11-3.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:httpd-devel-0:2.2.11-3.el5s2.i386"
},
"product_reference": "httpd-devel-0:2.2.11-3.el5s2.i386",
"relates_to_product_reference": "5Server-Stacks"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-devel-0:2.2.11-3.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:httpd-devel-0:2.2.11-3.el5s2.x86_64"
},
"product_reference": "httpd-devel-0:2.2.11-3.el5s2.x86_64",
"relates_to_product_reference": "5Server-Stacks"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.11-3.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:httpd-manual-0:2.2.11-3.el5s2.i386"
},
"product_reference": "httpd-manual-0:2.2.11-3.el5s2.i386",
"relates_to_product_reference": "5Server-Stacks"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "httpd-manual-0:2.2.11-3.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:httpd-manual-0:2.2.11-3.el5s2.x86_64"
},
"product_reference": "httpd-manual-0:2.2.11-3.el5s2.x86_64",
"relates_to_product_reference": "5Server-Stacks"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.11-3.el5s2.i386 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:mod_ssl-1:2.2.11-3.el5s2.i386"
},
"product_reference": "mod_ssl-1:2.2.11-3.el5s2.i386",
"relates_to_product_reference": "5Server-Stacks"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mod_ssl-1:2.2.11-3.el5s2.x86_64 as a component of Red Hat Application Stack v2 for Enterprise Linux (v.5)",
"product_id": "5Server-Stacks:mod_ssl-1:2.2.11-3.el5s2.x86_64"
},
"product_reference": "mod_ssl-1:2.2.11-3.el5s2.x86_64",
"relates_to_product_reference": "5Server-Stacks"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-1195",
"discovery_date": "2009-03-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "489436"
}
],
"notes": [
{
"category": "description",
"text": "The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: AllowOverride Options=IncludesNoExec allows Options Includes",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.src",
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-debuginfo-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-debuginfo-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-devel-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-devel-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-manual-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-manual-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:mod_ssl-1:2.2.11-3.el5s2.i386",
"5Server-Stacks:mod_ssl-1:2.2.11-3.el5s2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1195"
},
{
"category": "external",
"summary": "RHBZ#489436",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=489436"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1195"
}
],
"release_date": "2009-04-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-14T19:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.src",
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-debuginfo-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-debuginfo-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-devel-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-devel-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-manual-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-manual-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:mod_ssl-1:2.2.11-3.el5s2.i386",
"5Server-Stacks:mod_ssl-1:2.2.11-3.el5s2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1156"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.src",
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-debuginfo-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-debuginfo-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-devel-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-devel-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-manual-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-manual-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:mod_ssl-1:2.2.11-3.el5s2.i386",
"5Server-Stacks:mod_ssl-1:2.2.11-3.el5s2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: AllowOverride Options=IncludesNoExec allows Options Includes"
},
{
"cve": "CVE-2009-1890",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"discovery_date": "2009-06-30T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "509375"
}
],
"notes": [
{
"category": "description",
"text": "The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: mod_proxy reverse proxy DoS (infinite loop)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.src",
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-debuginfo-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-debuginfo-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-devel-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-devel-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-manual-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-manual-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:mod_ssl-1:2.2.11-3.el5s2.i386",
"5Server-Stacks:mod_ssl-1:2.2.11-3.el5s2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1890"
},
{
"category": "external",
"summary": "RHBZ#509375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509375"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1890",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1890"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1890",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1890"
}
],
"release_date": "2009-07-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-14T19:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.src",
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-debuginfo-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-debuginfo-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-devel-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-devel-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-manual-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-manual-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:mod_ssl-1:2.2.11-3.el5s2.i386",
"5Server-Stacks:mod_ssl-1:2.2.11-3.el5s2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1156"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.src",
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-debuginfo-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-debuginfo-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-devel-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-devel-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-manual-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-manual-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:mod_ssl-1:2.2.11-3.el5s2.i386",
"5Server-Stacks:mod_ssl-1:2.2.11-3.el5s2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "httpd: mod_proxy reverse proxy DoS (infinite loop)"
},
{
"cve": "CVE-2009-1891",
"discovery_date": "2009-06-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "509125"
}
],
"notes": [
{
"category": "description",
"text": "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "httpd: possible temporary DoS (CPU consumption) in mod_deflate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.src",
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-debuginfo-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-debuginfo-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-devel-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-devel-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-manual-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-manual-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:mod_ssl-1:2.2.11-3.el5s2.i386",
"5Server-Stacks:mod_ssl-1:2.2.11-3.el5s2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2009-1891"
},
{
"category": "external",
"summary": "RHBZ#509125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2009-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1891"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891"
}
],
"release_date": "2009-06-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2009-07-14T19:07:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259",
"product_ids": [
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.src",
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-debuginfo-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-debuginfo-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-devel-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-devel-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-manual-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-manual-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:mod_ssl-1:2.2.11-3.el5s2.i386",
"5Server-Stacks:mod_ssl-1:2.2.11-3.el5s2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2009:1156"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.6,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.src",
"5Server-Stacks:httpd-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-debuginfo-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-debuginfo-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-devel-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-devel-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:httpd-manual-0:2.2.11-3.el5s2.i386",
"5Server-Stacks:httpd-manual-0:2.2.11-3.el5s2.x86_64",
"5Server-Stacks:mod_ssl-1:2.2.11-3.el5s2.i386",
"5Server-Stacks:mod_ssl-1:2.2.11-3.el5s2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "httpd: possible temporary DoS (CPU consumption) in mod_deflate"
}
]
}
GHSA-HWVH-JV6J-6P3P
Vulnerability from github – Published: 2022-05-02 03:29 – Updated: 2025-04-09 04:11The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
{
"affected": [],
"aliases": [
"CVE-2009-1891"
],
"database_specific": {
"cwe_ids": [
"CWE-400"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2009-07-10T15:30:00Z",
"severity": "HIGH"
},
"details": "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).",
"id": "GHSA-hwvh-jv6j-6p3p",
"modified": "2025-04-09T04:11:48Z",
"published": "2022-05-02T03:29:37Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1891"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12361"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8632"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9248"
},
{
"type": "WEB",
"url": "https://rhn.redhat.com/errata/RHSA-2009-1148.html"
},
{
"type": "WEB",
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01363.html"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E"
},
{
"type": "WEB",
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712"
},
{
"type": "WEB",
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=apache-httpd-dev\u0026m=124621326524824\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=apache-httpd-dev\u0026m=124661528519546\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=129190899612998\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2"
},
{
"type": "WEB",
"url": "http://osvdb.org/55782"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35721"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35781"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35793"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/35865"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/37152"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/37221"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-200907-04.xml"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT3937"
},
{
"type": "WEB",
"url": "http://wiki.rpath.com/Advisories:rPSA-2009-0142"
},
{
"type": "WEB",
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0142"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK91361"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK99480"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2009/dsa-1834"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:149"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2009-1156.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/507857/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1022529"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-802-1"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/1841"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2009/3184"
}
],
"schema_version": "1.4.0",
"severity": []
}
OPENSUSE-SU-2024:10268-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "apache2-2.4.23-4.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the apache2-2.4.23-4.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10268",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10268-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-0023 page",
"url": "https://www.suse.com/security/cve/CVE-2009-0023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1191 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1195 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1195/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1890 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1890/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1891 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1891/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1955 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1955/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-1956 page",
"url": "https://www.suse.com/security/cve/CVE-2009-1956/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-2412 page",
"url": "https://www.suse.com/security/cve/CVE-2009-2412/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-2699 page",
"url": "https://www.suse.com/security/cve/CVE-2009-2699/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-3094 page",
"url": "https://www.suse.com/security/cve/CVE-2009-3094/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-3095 page",
"url": "https://www.suse.com/security/cve/CVE-2009-3095/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-3555 page",
"url": "https://www.suse.com/security/cve/CVE-2009-3555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-3560 page",
"url": "https://www.suse.com/security/cve/CVE-2009-3560/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2009-3720 page",
"url": "https://www.suse.com/security/cve/CVE-2009-3720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-0408 page",
"url": "https://www.suse.com/security/cve/CVE-2010-0408/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-0425 page",
"url": "https://www.suse.com/security/cve/CVE-2010-0425/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-0434 page",
"url": "https://www.suse.com/security/cve/CVE-2010-0434/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-1452 page",
"url": "https://www.suse.com/security/cve/CVE-2010-1452/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-1623 page",
"url": "https://www.suse.com/security/cve/CVE-2010-1623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2010-2068 page",
"url": "https://www.suse.com/security/cve/CVE-2010-2068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-1176 page",
"url": "https://www.suse.com/security/cve/CVE-2011-1176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3192 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3192/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3368 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3368/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-3607 page",
"url": "https://www.suse.com/security/cve/CVE-2011-3607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2011-4317 page",
"url": "https://www.suse.com/security/cve/CVE-2011-4317/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0021 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0031 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0031/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-0053 page",
"url": "https://www.suse.com/security/cve/CVE-2012-0053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-2687 page",
"url": "https://www.suse.com/security/cve/CVE-2012-2687/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-3499 page",
"url": "https://www.suse.com/security/cve/CVE-2012-3499/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-3502 page",
"url": "https://www.suse.com/security/cve/CVE-2012-3502/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-1896 page",
"url": "https://www.suse.com/security/cve/CVE-2013-1896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-2249 page",
"url": "https://www.suse.com/security/cve/CVE-2013-2249/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-5704 page",
"url": "https://www.suse.com/security/cve/CVE-2013-5704/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-6438 page",
"url": "https://www.suse.com/security/cve/CVE-2013-6438/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0098 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0117 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0117/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0118 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0226 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0226/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0231 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0231/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3523 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3523/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3581 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3581/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-3583 page",
"url": "https://www.suse.com/security/cve/CVE-2014-3583/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8109 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0228 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0228/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0253 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0253/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-4000 page",
"url": "https://www.suse.com/security/cve/CVE-2015-4000/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4979 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4979/"
}
],
"title": "apache2-2.4.23-4.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10268-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.23-4.1.aarch64",
"product": {
"name": "apache2-2.4.23-4.1.aarch64",
"product_id": "apache2-2.4.23-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.23-4.1.aarch64",
"product": {
"name": "apache2-devel-2.4.23-4.1.aarch64",
"product_id": "apache2-devel-2.4.23-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-doc-2.4.23-4.1.aarch64",
"product": {
"name": "apache2-doc-2.4.23-4.1.aarch64",
"product_id": "apache2-doc-2.4.23-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.23-4.1.aarch64",
"product": {
"name": "apache2-event-2.4.23-4.1.aarch64",
"product_id": "apache2-event-2.4.23-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.23-4.1.aarch64",
"product": {
"name": "apache2-example-pages-2.4.23-4.1.aarch64",
"product_id": "apache2-example-pages-2.4.23-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.23-4.1.aarch64",
"product": {
"name": "apache2-prefork-2.4.23-4.1.aarch64",
"product_id": "apache2-prefork-2.4.23-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.23-4.1.aarch64",
"product": {
"name": "apache2-utils-2.4.23-4.1.aarch64",
"product_id": "apache2-utils-2.4.23-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.23-4.1.aarch64",
"product": {
"name": "apache2-worker-2.4.23-4.1.aarch64",
"product_id": "apache2-worker-2.4.23-4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.23-4.1.ppc64le",
"product": {
"name": "apache2-2.4.23-4.1.ppc64le",
"product_id": "apache2-2.4.23-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.23-4.1.ppc64le",
"product": {
"name": "apache2-devel-2.4.23-4.1.ppc64le",
"product_id": "apache2-devel-2.4.23-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-doc-2.4.23-4.1.ppc64le",
"product": {
"name": "apache2-doc-2.4.23-4.1.ppc64le",
"product_id": "apache2-doc-2.4.23-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.23-4.1.ppc64le",
"product": {
"name": "apache2-event-2.4.23-4.1.ppc64le",
"product_id": "apache2-event-2.4.23-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.23-4.1.ppc64le",
"product": {
"name": "apache2-example-pages-2.4.23-4.1.ppc64le",
"product_id": "apache2-example-pages-2.4.23-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.23-4.1.ppc64le",
"product": {
"name": "apache2-prefork-2.4.23-4.1.ppc64le",
"product_id": "apache2-prefork-2.4.23-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.23-4.1.ppc64le",
"product": {
"name": "apache2-utils-2.4.23-4.1.ppc64le",
"product_id": "apache2-utils-2.4.23-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.23-4.1.ppc64le",
"product": {
"name": "apache2-worker-2.4.23-4.1.ppc64le",
"product_id": "apache2-worker-2.4.23-4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.23-4.1.s390x",
"product": {
"name": "apache2-2.4.23-4.1.s390x",
"product_id": "apache2-2.4.23-4.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.23-4.1.s390x",
"product": {
"name": "apache2-devel-2.4.23-4.1.s390x",
"product_id": "apache2-devel-2.4.23-4.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-doc-2.4.23-4.1.s390x",
"product": {
"name": "apache2-doc-2.4.23-4.1.s390x",
"product_id": "apache2-doc-2.4.23-4.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.23-4.1.s390x",
"product": {
"name": "apache2-event-2.4.23-4.1.s390x",
"product_id": "apache2-event-2.4.23-4.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.23-4.1.s390x",
"product": {
"name": "apache2-example-pages-2.4.23-4.1.s390x",
"product_id": "apache2-example-pages-2.4.23-4.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.23-4.1.s390x",
"product": {
"name": "apache2-prefork-2.4.23-4.1.s390x",
"product_id": "apache2-prefork-2.4.23-4.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.23-4.1.s390x",
"product": {
"name": "apache2-utils-2.4.23-4.1.s390x",
"product_id": "apache2-utils-2.4.23-4.1.s390x"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.23-4.1.s390x",
"product": {
"name": "apache2-worker-2.4.23-4.1.s390x",
"product_id": "apache2-worker-2.4.23-4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "apache2-2.4.23-4.1.x86_64",
"product": {
"name": "apache2-2.4.23-4.1.x86_64",
"product_id": "apache2-2.4.23-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-devel-2.4.23-4.1.x86_64",
"product": {
"name": "apache2-devel-2.4.23-4.1.x86_64",
"product_id": "apache2-devel-2.4.23-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-doc-2.4.23-4.1.x86_64",
"product": {
"name": "apache2-doc-2.4.23-4.1.x86_64",
"product_id": "apache2-doc-2.4.23-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-event-2.4.23-4.1.x86_64",
"product": {
"name": "apache2-event-2.4.23-4.1.x86_64",
"product_id": "apache2-event-2.4.23-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-example-pages-2.4.23-4.1.x86_64",
"product": {
"name": "apache2-example-pages-2.4.23-4.1.x86_64",
"product_id": "apache2-example-pages-2.4.23-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-prefork-2.4.23-4.1.x86_64",
"product": {
"name": "apache2-prefork-2.4.23-4.1.x86_64",
"product_id": "apache2-prefork-2.4.23-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-utils-2.4.23-4.1.x86_64",
"product": {
"name": "apache2-utils-2.4.23-4.1.x86_64",
"product_id": "apache2-utils-2.4.23-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "apache2-worker-2.4.23-4.1.x86_64",
"product": {
"name": "apache2-worker-2.4.23-4.1.x86_64",
"product_id": "apache2-worker-2.4.23-4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64"
},
"product_reference": "apache2-2.4.23-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le"
},
"product_reference": "apache2-2.4.23-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x"
},
"product_reference": "apache2-2.4.23-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-2.4.23-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64"
},
"product_reference": "apache2-2.4.23-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.23-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64"
},
"product_reference": "apache2-devel-2.4.23-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.23-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le"
},
"product_reference": "apache2-devel-2.4.23-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.23-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x"
},
"product_reference": "apache2-devel-2.4.23-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-devel-2.4.23-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64"
},
"product_reference": "apache2-devel-2.4.23-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.23-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64"
},
"product_reference": "apache2-doc-2.4.23-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.23-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le"
},
"product_reference": "apache2-doc-2.4.23-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.23-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x"
},
"product_reference": "apache2-doc-2.4.23-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-doc-2.4.23-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64"
},
"product_reference": "apache2-doc-2.4.23-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.23-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64"
},
"product_reference": "apache2-event-2.4.23-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.23-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le"
},
"product_reference": "apache2-event-2.4.23-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.23-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x"
},
"product_reference": "apache2-event-2.4.23-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-event-2.4.23-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64"
},
"product_reference": "apache2-event-2.4.23-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64"
},
"product_reference": "apache2-example-pages-2.4.23-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le"
},
"product_reference": "apache2-example-pages-2.4.23-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x"
},
"product_reference": "apache2-example-pages-2.4.23-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-example-pages-2.4.23-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64"
},
"product_reference": "apache2-example-pages-2.4.23-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64"
},
"product_reference": "apache2-prefork-2.4.23-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le"
},
"product_reference": "apache2-prefork-2.4.23-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x"
},
"product_reference": "apache2-prefork-2.4.23-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-prefork-2.4.23-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64"
},
"product_reference": "apache2-prefork-2.4.23-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64"
},
"product_reference": "apache2-utils-2.4.23-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le"
},
"product_reference": "apache2-utils-2.4.23-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x"
},
"product_reference": "apache2-utils-2.4.23-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-utils-2.4.23-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64"
},
"product_reference": "apache2-utils-2.4.23-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64"
},
"product_reference": "apache2-worker-2.4.23-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le"
},
"product_reference": "apache2-worker-2.4.23-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x"
},
"product_reference": "apache2-worker-2.4.23-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache2-worker-2.4.23-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
},
"product_reference": "apache2-worker-2.4.23-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2009-0023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-0023"
}
],
"notes": [
{
"category": "general",
"text": "The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-0023",
"url": "https://www.suse.com/security/cve/CVE-2009-0023"
},
{
"category": "external",
"summary": "SUSE Bug 510301 for CVE-2009-0023",
"url": "https://bugzilla.suse.com/510301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-0023"
},
{
"cve": "CVE-2009-1191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-1191"
}
],
"notes": [
{
"category": "general",
"text": "mod_proxy_ajp.c in the mod_proxy_ajp module in the Apache HTTP Server 2.2.11 allows remote attackers to obtain sensitive response data, intended for a client that sent an earlier POST request with no request body, via an HTTP request.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-1191",
"url": "https://www.suse.com/security/cve/CVE-2009-1191"
},
{
"category": "external",
"summary": "SUSE Bug 521943 for CVE-2009-1191",
"url": "https://bugzilla.suse.com/521943"
},
{
"category": "external",
"summary": "SUSE Bug 539571 for CVE-2009-1191",
"url": "https://bugzilla.suse.com/539571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-1191"
},
{
"cve": "CVE-2009-1195",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-1195"
}
],
"notes": [
{
"category": "general",
"text": "The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-1195",
"url": "https://www.suse.com/security/cve/CVE-2009-1195"
},
{
"category": "external",
"summary": "SUSE Bug 512583 for CVE-2009-1195",
"url": "https://bugzilla.suse.com/512583"
},
{
"category": "external",
"summary": "SUSE Bug 513080 for CVE-2009-1195",
"url": "https://bugzilla.suse.com/513080"
},
{
"category": "external",
"summary": "SUSE Bug 539571 for CVE-2009-1195",
"url": "https://bugzilla.suse.com/539571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-1195"
},
{
"cve": "CVE-2009-1890",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-1890"
}
],
"notes": [
{
"category": "general",
"text": "The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-1890",
"url": "https://www.suse.com/security/cve/CVE-2009-1890"
},
{
"category": "external",
"summary": "SUSE Bug 519194 for CVE-2009-1890",
"url": "https://bugzilla.suse.com/519194"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2009-1890"
},
{
"cve": "CVE-2009-1891",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-1891"
}
],
"notes": [
{
"category": "general",
"text": "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-1891",
"url": "https://www.suse.com/security/cve/CVE-2009-1891"
},
{
"category": "external",
"summary": "SUSE Bug 521906 for CVE-2009-1891",
"url": "https://bugzilla.suse.com/521906"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2009-1891"
},
{
"cve": "CVE-2009-1955",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-1955"
}
],
"notes": [
{
"category": "general",
"text": "The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-1955",
"url": "https://www.suse.com/security/cve/CVE-2009-1955"
},
{
"category": "external",
"summary": "SUSE Bug 509825 for CVE-2009-1955",
"url": "https://bugzilla.suse.com/509825"
},
{
"category": "external",
"summary": "SUSE Bug 510301 for CVE-2009-1955",
"url": "https://bugzilla.suse.com/510301"
},
{
"category": "external",
"summary": "SUSE Bug 529591 for CVE-2009-1955",
"url": "https://bugzilla.suse.com/529591"
},
{
"category": "external",
"summary": "SUSE Bug 992541 for CVE-2009-1955",
"url": "https://bugzilla.suse.com/992541"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2009-1955"
},
{
"cve": "CVE-2009-1956",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-1956"
}
],
"notes": [
{
"category": "general",
"text": "Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-1956",
"url": "https://www.suse.com/security/cve/CVE-2009-1956"
},
{
"category": "external",
"summary": "SUSE Bug 510301 for CVE-2009-1956",
"url": "https://bugzilla.suse.com/510301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-1956"
},
{
"cve": "CVE-2009-2412",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-2412"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows. NOTE: some of these details are obtained from third party information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-2412",
"url": "https://www.suse.com/security/cve/CVE-2009-2412"
},
{
"category": "external",
"summary": "SUSE Bug 528714 for CVE-2009-2412",
"url": "https://bugzilla.suse.com/528714"
},
{
"category": "external",
"summary": "SUSE Bug 529591 for CVE-2009-2412",
"url": "https://bugzilla.suse.com/529591"
},
{
"category": "external",
"summary": "SUSE Bug 802057 for CVE-2009-2412",
"url": "https://bugzilla.suse.com/802057"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2009-2412"
},
{
"cve": "CVE-2009-2699",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-2699"
}
],
"notes": [
{
"category": "general",
"text": "The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows remote attackers to cause a denial of service (daemon hang) via unspecified HTTP requests, related to the prefork and event MPMs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-2699",
"url": "https://www.suse.com/security/cve/CVE-2009-2699"
},
{
"category": "external",
"summary": "SUSE Bug 1078450 for CVE-2009-2699",
"url": "https://bugzilla.suse.com/1078450"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2009-2699"
},
{
"cve": "CVE-2009-3094",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-3094"
}
],
"notes": [
{
"category": "general",
"text": "The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-3094",
"url": "https://www.suse.com/security/cve/CVE-2009-3094"
},
{
"category": "external",
"summary": "SUSE Bug 538322 for CVE-2009-3094",
"url": "https://bugzilla.suse.com/538322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-3094"
},
{
"cve": "CVE-2009-3095",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-3095"
}
],
"notes": [
{
"category": "general",
"text": "The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-3095",
"url": "https://www.suse.com/security/cve/CVE-2009-3095"
},
{
"category": "external",
"summary": "SUSE Bug 538322 for CVE-2009-3095",
"url": "https://bugzilla.suse.com/538322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-3095"
},
{
"cve": "CVE-2009-3555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-3555"
}
],
"notes": [
{
"category": "general",
"text": "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-3555",
"url": "https://www.suse.com/security/cve/CVE-2009-3555"
},
{
"category": "external",
"summary": "SUSE Bug 1077582 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/1077582"
},
{
"category": "external",
"summary": "SUSE Bug 459468 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/459468"
},
{
"category": "external",
"summary": "SUSE Bug 552497 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/552497"
},
{
"category": "external",
"summary": "SUSE Bug 553641 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/553641"
},
{
"category": "external",
"summary": "SUSE Bug 554069 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/554069"
},
{
"category": "external",
"summary": "SUSE Bug 554084 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/554084"
},
{
"category": "external",
"summary": "SUSE Bug 554085 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/554085"
},
{
"category": "external",
"summary": "SUSE Bug 555177 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/555177"
},
{
"category": "external",
"summary": "SUSE Bug 557168 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/557168"
},
{
"category": "external",
"summary": "SUSE Bug 564507 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/564507"
},
{
"category": "external",
"summary": "SUSE Bug 566041 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/566041"
},
{
"category": "external",
"summary": "SUSE Bug 584292 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/584292"
},
{
"category": "external",
"summary": "SUSE Bug 586567 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/586567"
},
{
"category": "external",
"summary": "SUSE Bug 588996 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/588996"
},
{
"category": "external",
"summary": "SUSE Bug 590826 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/590826"
},
{
"category": "external",
"summary": "SUSE Bug 592589 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/592589"
},
{
"category": "external",
"summary": "SUSE Bug 594415 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/594415"
},
{
"category": "external",
"summary": "SUSE Bug 604782 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/604782"
},
{
"category": "external",
"summary": "SUSE Bug 614753 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/614753"
},
{
"category": "external",
"summary": "SUSE Bug 622073 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/622073"
},
{
"category": "external",
"summary": "SUSE Bug 623905 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/623905"
},
{
"category": "external",
"summary": "SUSE Bug 629905 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/629905"
},
{
"category": "external",
"summary": "SUSE Bug 642531 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/642531"
},
{
"category": "external",
"summary": "SUSE Bug 646073 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/646073"
},
{
"category": "external",
"summary": "SUSE Bug 646906 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/646906"
},
{
"category": "external",
"summary": "SUSE Bug 648140 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/648140"
},
{
"category": "external",
"summary": "SUSE Bug 648950 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/648950"
},
{
"category": "external",
"summary": "SUSE Bug 659926 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/659926"
},
{
"category": "external",
"summary": "SUSE Bug 670152 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/670152"
},
{
"category": "external",
"summary": "SUSE Bug 704832 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/704832"
},
{
"category": "external",
"summary": "SUSE Bug 728876 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/728876"
},
{
"category": "external",
"summary": "SUSE Bug 729181 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/729181"
},
{
"category": "external",
"summary": "SUSE Bug 753357 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/753357"
},
{
"category": "external",
"summary": "SUSE Bug 791794 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/791794"
},
{
"category": "external",
"summary": "SUSE Bug 799454 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/799454"
},
{
"category": "external",
"summary": "SUSE Bug 815621 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/815621"
},
{
"category": "external",
"summary": "SUSE Bug 905347 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/905347"
},
{
"category": "external",
"summary": "SUSE Bug 979060 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/979060"
},
{
"category": "external",
"summary": "SUSE Bug 986238 for CVE-2009-3555",
"url": "https://bugzilla.suse.com/986238"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-3555"
},
{
"cve": "CVE-2009-3560",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-3560"
}
],
"notes": [
{
"category": "general",
"text": "The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-3560",
"url": "https://www.suse.com/security/cve/CVE-2009-3560"
},
{
"category": "external",
"summary": "SUSE Bug 550666 for CVE-2009-3560",
"url": "https://bugzilla.suse.com/550666"
},
{
"category": "external",
"summary": "SUSE Bug 558892 for CVE-2009-3560",
"url": "https://bugzilla.suse.com/558892"
},
{
"category": "external",
"summary": "SUSE Bug 561561 for CVE-2009-3560",
"url": "https://bugzilla.suse.com/561561"
},
{
"category": "external",
"summary": "SUSE Bug 581162 for CVE-2009-3560",
"url": "https://bugzilla.suse.com/581162"
},
{
"category": "external",
"summary": "SUSE Bug 581765 for CVE-2009-3560",
"url": "https://bugzilla.suse.com/581765"
},
{
"category": "external",
"summary": "SUSE Bug 611931 for CVE-2009-3560",
"url": "https://bugzilla.suse.com/611931"
},
{
"category": "external",
"summary": "SUSE Bug 694595 for CVE-2009-3560",
"url": "https://bugzilla.suse.com/694595"
},
{
"category": "external",
"summary": "SUSE Bug 725950 for CVE-2009-3560",
"url": "https://bugzilla.suse.com/725950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-3560"
},
{
"cve": "CVE-2009-3720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2009-3720"
}
],
"notes": [
{
"category": "general",
"text": "The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2009-3720",
"url": "https://www.suse.com/security/cve/CVE-2009-3720"
},
{
"category": "external",
"summary": "SUSE Bug 534721 for CVE-2009-3720",
"url": "https://bugzilla.suse.com/534721"
},
{
"category": "external",
"summary": "SUSE Bug 550664 for CVE-2009-3720",
"url": "https://bugzilla.suse.com/550664"
},
{
"category": "external",
"summary": "SUSE Bug 550666 for CVE-2009-3720",
"url": "https://bugzilla.suse.com/550666"
},
{
"category": "external",
"summary": "SUSE Bug 558892 for CVE-2009-3720",
"url": "https://bugzilla.suse.com/558892"
},
{
"category": "external",
"summary": "SUSE Bug 561561 for CVE-2009-3720",
"url": "https://bugzilla.suse.com/561561"
},
{
"category": "external",
"summary": "SUSE Bug 581162 for CVE-2009-3720",
"url": "https://bugzilla.suse.com/581162"
},
{
"category": "external",
"summary": "SUSE Bug 581765 for CVE-2009-3720",
"url": "https://bugzilla.suse.com/581765"
},
{
"category": "external",
"summary": "SUSE Bug 611931 for CVE-2009-3720",
"url": "https://bugzilla.suse.com/611931"
},
{
"category": "external",
"summary": "SUSE Bug 725950 for CVE-2009-3720",
"url": "https://bugzilla.suse.com/725950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2009-3720"
},
{
"cve": "CVE-2010-0408",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-0408"
}
],
"notes": [
{
"category": "general",
"text": "The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-0408",
"url": "https://www.suse.com/security/cve/CVE-2010-0408"
},
{
"category": "external",
"summary": "SUSE Bug 586572 for CVE-2010-0408",
"url": "https://bugzilla.suse.com/586572"
},
{
"category": "external",
"summary": "SUSE Bug 601151 for CVE-2010-0408",
"url": "https://bugzilla.suse.com/601151"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-0408"
},
{
"cve": "CVE-2010-0425",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-0425"
}
],
"notes": [
{
"category": "general",
"text": "modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and \"orphaned callback pointers.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-0425",
"url": "https://www.suse.com/security/cve/CVE-2010-0425"
},
{
"category": "external",
"summary": "SUSE Bug 1078450 for CVE-2010-0425",
"url": "https://bugzilla.suse.com/1078450"
},
{
"category": "external",
"summary": "SUSE Bug 586572 for CVE-2010-0425",
"url": "https://bugzilla.suse.com/586572"
},
{
"category": "external",
"summary": "SUSE Bug 601151 for CVE-2010-0425",
"url": "https://bugzilla.suse.com/601151"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2010-0425"
},
{
"cve": "CVE-2010-0434",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-0434"
}
],
"notes": [
{
"category": "general",
"text": "The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-0434",
"url": "https://www.suse.com/security/cve/CVE-2010-0434"
},
{
"category": "external",
"summary": "SUSE Bug 586572 for CVE-2010-0434",
"url": "https://bugzilla.suse.com/586572"
},
{
"category": "external",
"summary": "SUSE Bug 601151 for CVE-2010-0434",
"url": "https://bugzilla.suse.com/601151"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-0434"
},
{
"cve": "CVE-2010-1452",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-1452"
}
],
"notes": [
{
"category": "general",
"text": "The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-1452",
"url": "https://www.suse.com/security/cve/CVE-2010-1452"
},
{
"category": "external",
"summary": "SUSE Bug 627030 for CVE-2010-1452",
"url": "https://bugzilla.suse.com/627030"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-1452"
},
{
"cve": "CVE-2010-1623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-1623"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-1623",
"url": "https://www.suse.com/security/cve/CVE-2010-1623"
},
{
"category": "external",
"summary": "SUSE Bug 650435 for CVE-2010-1623",
"url": "https://bugzilla.suse.com/650435"
},
{
"category": "external",
"summary": "SUSE Bug 693778 for CVE-2010-1623",
"url": "https://bugzilla.suse.com/693778"
},
{
"category": "external",
"summary": "SUSE Bug 725950 for CVE-2010-1623",
"url": "https://bugzilla.suse.com/725950"
},
{
"category": "external",
"summary": "SUSE Bug 997229 for CVE-2010-1623",
"url": "https://bugzilla.suse.com/997229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-1623"
},
{
"cve": "CVE-2010-2068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2010-2068"
}
],
"notes": [
{
"category": "general",
"text": "mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2010-2068",
"url": "https://www.suse.com/security/cve/CVE-2010-2068"
},
{
"category": "external",
"summary": "SUSE Bug 627030 for CVE-2010-2068",
"url": "https://bugzilla.suse.com/627030"
},
{
"category": "external",
"summary": "SUSE Bug 627387 for CVE-2010-2068",
"url": "https://bugzilla.suse.com/627387"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2010-2068"
},
{
"cve": "CVE-2011-1176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-1176"
}
],
"notes": [
{
"category": "general",
"text": "The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk Multi-Processing Module 2.2.11-01 and 2.2.11-02 for the Apache HTTP Server does not properly handle certain configuration sections that specify NiceValue but not AssignUserID, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-1176",
"url": "https://www.suse.com/security/cve/CVE-2011-1176"
},
{
"category": "external",
"summary": "SUSE Bug 681176 for CVE-2011-1176",
"url": "https://bugzilla.suse.com/681176"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-1176"
},
{
"cve": "CVE-2011-3192",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3192"
}
],
"notes": [
{
"category": "general",
"text": "The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3192",
"url": "https://www.suse.com/security/cve/CVE-2011-3192"
},
{
"category": "external",
"summary": "SUSE Bug 713966 for CVE-2011-3192",
"url": "https://bugzilla.suse.com/713966"
},
{
"category": "external",
"summary": "SUSE Bug 714306 for CVE-2011-3192",
"url": "https://bugzilla.suse.com/714306"
},
{
"category": "external",
"summary": "SUSE Bug 716634 for CVE-2011-3192",
"url": "https://bugzilla.suse.com/716634"
},
{
"category": "external",
"summary": "SUSE Bug 718106 for CVE-2011-3192",
"url": "https://bugzilla.suse.com/718106"
},
{
"category": "external",
"summary": "SUSE Bug 722545 for CVE-2011-3192",
"url": "https://bugzilla.suse.com/722545"
},
{
"category": "external",
"summary": "SUSE Bug 726139 for CVE-2011-3192",
"url": "https://bugzilla.suse.com/726139"
},
{
"category": "external",
"summary": "SUSE Bug 732051 for CVE-2011-3192",
"url": "https://bugzilla.suse.com/732051"
},
{
"category": "external",
"summary": "SUSE Bug 983778 for CVE-2011-3192",
"url": "https://bugzilla.suse.com/983778"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2011-3192"
},
{
"cve": "CVE-2011-3368",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3368"
}
],
"notes": [
{
"category": "general",
"text": "The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3368",
"url": "https://www.suse.com/security/cve/CVE-2011-3368"
},
{
"category": "external",
"summary": "SUSE Bug 722545 for CVE-2011-3368",
"url": "https://bugzilla.suse.com/722545"
},
{
"category": "external",
"summary": "SUSE Bug 723308 for CVE-2011-3368",
"url": "https://bugzilla.suse.com/723308"
},
{
"category": "external",
"summary": "SUSE Bug 728876 for CVE-2011-3368",
"url": "https://bugzilla.suse.com/728876"
},
{
"category": "external",
"summary": "SUSE Bug 729181 for CVE-2011-3368",
"url": "https://bugzilla.suse.com/729181"
},
{
"category": "external",
"summary": "SUSE Bug 754831 for CVE-2011-3368",
"url": "https://bugzilla.suse.com/754831"
},
{
"category": "external",
"summary": "SUSE Bug 791794 for CVE-2011-3368",
"url": "https://bugzilla.suse.com/791794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-3368"
},
{
"cve": "CVE-2011-3607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-3607"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-3607",
"url": "https://www.suse.com/security/cve/CVE-2011-3607"
},
{
"category": "external",
"summary": "SUSE Bug 728876 for CVE-2011-3607",
"url": "https://bugzilla.suse.com/728876"
},
{
"category": "external",
"summary": "SUSE Bug 729181 for CVE-2011-3607",
"url": "https://bugzilla.suse.com/729181"
},
{
"category": "external",
"summary": "SUSE Bug 729183 for CVE-2011-3607",
"url": "https://bugzilla.suse.com/729183"
},
{
"category": "external",
"summary": "SUSE Bug 806721 for CVE-2011-3607",
"url": "https://bugzilla.suse.com/806721"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-3607"
},
{
"cve": "CVE-2011-4317",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2011-4317"
}
],
"notes": [
{
"category": "general",
"text": "The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2011-4317",
"url": "https://www.suse.com/security/cve/CVE-2011-4317"
},
{
"category": "external",
"summary": "SUSE Bug 722545 for CVE-2011-4317",
"url": "https://bugzilla.suse.com/722545"
},
{
"category": "external",
"summary": "SUSE Bug 728876 for CVE-2011-4317",
"url": "https://bugzilla.suse.com/728876"
},
{
"category": "external",
"summary": "SUSE Bug 729181 for CVE-2011-4317",
"url": "https://bugzilla.suse.com/729181"
},
{
"category": "external",
"summary": "SUSE Bug 791794 for CVE-2011-4317",
"url": "https://bugzilla.suse.com/791794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2011-4317"
},
{
"cve": "CVE-2012-0021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0021"
}
],
"notes": [
{
"category": "general",
"text": "The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0021",
"url": "https://www.suse.com/security/cve/CVE-2012-0021"
},
{
"category": "external",
"summary": "SUSE Bug 1078450 for CVE-2012-0021",
"url": "https://bugzilla.suse.com/1078450"
},
{
"category": "external",
"summary": "SUSE Bug 743744 for CVE-2012-0021",
"url": "https://bugzilla.suse.com/743744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-0021"
},
{
"cve": "CVE-2012-0031",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0031"
}
],
"notes": [
{
"category": "general",
"text": "scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0031",
"url": "https://www.suse.com/security/cve/CVE-2012-0031"
},
{
"category": "external",
"summary": "SUSE Bug 741243 for CVE-2012-0031",
"url": "https://bugzilla.suse.com/741243"
},
{
"category": "external",
"summary": "SUSE Bug 806721 for CVE-2012-0031",
"url": "https://bugzilla.suse.com/806721"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-0031"
},
{
"cve": "CVE-2012-0053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-0053"
}
],
"notes": [
{
"category": "general",
"text": "protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-0053",
"url": "https://www.suse.com/security/cve/CVE-2012-0053"
},
{
"category": "external",
"summary": "SUSE Bug 743743 for CVE-2012-0053",
"url": "https://bugzilla.suse.com/743743"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-0053"
},
{
"cve": "CVE-2012-2687",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-2687"
}
],
"notes": [
{
"category": "general",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-2687",
"url": "https://www.suse.com/security/cve/CVE-2012-2687"
},
{
"category": "external",
"summary": "SUSE Bug 777260 for CVE-2012-2687",
"url": "https://bugzilla.suse.com/777260"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2012-2687"
},
{
"cve": "CVE-2012-3499",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-3499"
}
],
"notes": [
{
"category": "general",
"text": "Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-3499",
"url": "https://www.suse.com/security/cve/CVE-2012-3499"
},
{
"category": "external",
"summary": "SUSE Bug 806458 for CVE-2012-3499",
"url": "https://bugzilla.suse.com/806458"
},
{
"category": "external",
"summary": "SUSE Bug 807511 for CVE-2012-3499",
"url": "https://bugzilla.suse.com/807511"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-3499"
},
{
"cve": "CVE-2012-3502",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-3502"
}
],
"notes": [
{
"category": "general",
"text": "The proxy functionality in (1) mod_proxy_ajp.c in the mod_proxy_ajp module and (2) mod_proxy_http.c in the mod_proxy_http module in the Apache HTTP Server 2.4.x before 2.4.3 does not properly determine the situations that require closing a back-end connection, which allows remote attackers to obtain sensitive information in opportunistic circumstances by reading a response that was intended for a different client.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-3502",
"url": "https://www.suse.com/security/cve/CVE-2012-3502"
},
{
"category": "external",
"summary": "SUSE Bug 777119 for CVE-2012-3502",
"url": "https://bugzilla.suse.com/777119"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2012-3502"
},
{
"cve": "CVE-2013-1896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-1896"
}
],
"notes": [
{
"category": "general",
"text": "mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-1896",
"url": "https://www.suse.com/security/cve/CVE-2013-1896"
},
{
"category": "external",
"summary": "SUSE Bug 829056 for CVE-2013-1896",
"url": "https://bugzilla.suse.com/829056"
},
{
"category": "external",
"summary": "SUSE Bug 829057 for CVE-2013-1896",
"url": "https://bugzilla.suse.com/829057"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-1896"
},
{
"cve": "CVE-2013-2249",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-2249"
}
],
"notes": [
{
"category": "general",
"text": "mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-2249",
"url": "https://www.suse.com/security/cve/CVE-2013-2249"
},
{
"category": "external",
"summary": "SUSE Bug 831113 for CVE-2013-2249",
"url": "https://bugzilla.suse.com/831113"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2013-2249"
},
{
"cve": "CVE-2013-5704",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-5704"
}
],
"notes": [
{
"category": "general",
"text": "The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass \"RequestHeader unset\" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states \"this is not a security issue in httpd as such.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-5704",
"url": "https://www.suse.com/security/cve/CVE-2013-5704"
},
{
"category": "external",
"summary": "SUSE Bug 871310 for CVE-2013-5704",
"url": "https://bugzilla.suse.com/871310"
},
{
"category": "external",
"summary": "SUSE Bug 914535 for CVE-2013-5704",
"url": "https://bugzilla.suse.com/914535"
},
{
"category": "external",
"summary": "SUSE Bug 930944 for CVE-2013-5704",
"url": "https://bugzilla.suse.com/930944"
},
{
"category": "external",
"summary": "SUSE Bug 938728 for CVE-2013-5704",
"url": "https://bugzilla.suse.com/938728"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2013-5704"
},
{
"cve": "CVE-2013-6438",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-6438"
}
],
"notes": [
{
"category": "general",
"text": "The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-6438",
"url": "https://www.suse.com/security/cve/CVE-2013-6438"
},
{
"category": "external",
"summary": "SUSE Bug 869105 for CVE-2013-6438",
"url": "https://bugzilla.suse.com/869105"
},
{
"category": "external",
"summary": "SUSE Bug 869106 for CVE-2013-6438",
"url": "https://bugzilla.suse.com/869106"
},
{
"category": "external",
"summary": "SUSE Bug 887765 for CVE-2013-6438",
"url": "https://bugzilla.suse.com/887765"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2013-6438"
},
{
"cve": "CVE-2014-0098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-0098"
}
],
"notes": [
{
"category": "general",
"text": "The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-0098",
"url": "https://www.suse.com/security/cve/CVE-2014-0098"
},
{
"category": "external",
"summary": "SUSE Bug 869106 for CVE-2014-0098",
"url": "https://bugzilla.suse.com/869106"
},
{
"category": "external",
"summary": "SUSE Bug 887765 for CVE-2014-0098",
"url": "https://bugzilla.suse.com/887765"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-0098"
},
{
"cve": "CVE-2014-0117",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-0117"
}
],
"notes": [
{
"category": "general",
"text": "The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-0117",
"url": "https://www.suse.com/security/cve/CVE-2014-0117"
},
{
"category": "external",
"summary": "SUSE Bug 887767 for CVE-2014-0117",
"url": "https://bugzilla.suse.com/887767"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-0117"
},
{
"cve": "CVE-2014-0118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-0118"
}
],
"notes": [
{
"category": "general",
"text": "The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-0118",
"url": "https://www.suse.com/security/cve/CVE-2014-0118"
},
{
"category": "external",
"summary": "SUSE Bug 1078450 for CVE-2014-0118",
"url": "https://bugzilla.suse.com/1078450"
},
{
"category": "external",
"summary": "SUSE Bug 887769 for CVE-2014-0118",
"url": "https://bugzilla.suse.com/887769"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-0118"
},
{
"cve": "CVE-2014-0226",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-0226"
}
],
"notes": [
{
"category": "general",
"text": "Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-0226",
"url": "https://www.suse.com/security/cve/CVE-2014-0226"
},
{
"category": "external",
"summary": "SUSE Bug 887765 for CVE-2014-0226",
"url": "https://bugzilla.suse.com/887765"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-0226"
},
{
"cve": "CVE-2014-0231",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-0231"
}
],
"notes": [
{
"category": "general",
"text": "The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-0231",
"url": "https://www.suse.com/security/cve/CVE-2014-0231"
},
{
"category": "external",
"summary": "SUSE Bug 887768 for CVE-2014-0231",
"url": "https://bugzilla.suse.com/887768"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-0231"
},
{
"cve": "CVE-2014-3523",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-3523"
}
],
"notes": [
{
"category": "general",
"text": "Memory leak in the winnt_accept function in server/mpm/winnt/child.c in the WinNT MPM in the Apache HTTP Server 2.4.x before 2.4.10 on Windows, when the default AcceptFilter is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted requests.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-3523",
"url": "https://www.suse.com/security/cve/CVE-2014-3523"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-3523"
},
{
"cve": "CVE-2014-3581",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-3581"
}
],
"notes": [
{
"category": "general",
"text": "The cache_merge_headers_out function in modules/cache/cache_util.c in the mod_cache module in the Apache HTTP Server before 2.4.11 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty HTTP Content-Type header.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-3581",
"url": "https://www.suse.com/security/cve/CVE-2014-3581"
},
{
"category": "external",
"summary": "SUSE Bug 899836 for CVE-2014-3581",
"url": "https://bugzilla.suse.com/899836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-3581"
},
{
"cve": "CVE-2014-3583",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-3583"
}
],
"notes": [
{
"category": "general",
"text": "The handle_headers function in mod_proxy_fcgi.c in the mod_proxy_fcgi module in the Apache HTTP Server 2.4.10 allows remote FastCGI servers to cause a denial of service (buffer over-read and daemon crash) via long response headers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-3583",
"url": "https://www.suse.com/security/cve/CVE-2014-3583"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-3583"
},
{
"cve": "CVE-2014-8109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8109"
}
],
"notes": [
{
"category": "general",
"text": "mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multiple Require directives, as demonstrated by a configuration that specifies authorization for one group to access a certain directory, and authorization for a second group to access a second directory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8109",
"url": "https://www.suse.com/security/cve/CVE-2014-8109"
},
{
"category": "external",
"summary": "SUSE Bug 909715 for CVE-2014-8109",
"url": "https://bugzilla.suse.com/909715"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-8109"
},
{
"cve": "CVE-2015-0228",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0228"
}
],
"notes": [
{
"category": "general",
"text": "The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0228",
"url": "https://www.suse.com/security/cve/CVE-2015-0228"
},
{
"category": "external",
"summary": "SUSE Bug 918352 for CVE-2015-0228",
"url": "https://bugzilla.suse.com/918352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-0228"
},
{
"cve": "CVE-2015-0253",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0253"
}
],
"notes": [
{
"category": "general",
"text": "The read_request_line function in server/protocol.c in the Apache HTTP Server 2.4.12 does not initialize the protocol structure member, which allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) by sending a request that lacks a method to an installation that enables the INCLUDES filter and has an ErrorDocument 400 directive specifying a local URI.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0253",
"url": "https://www.suse.com/security/cve/CVE-2015-0253"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2015-0253"
},
{
"cve": "CVE-2015-4000",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-4000"
}
],
"notes": [
{
"category": "general",
"text": "The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-4000",
"url": "https://www.suse.com/security/cve/CVE-2015-4000"
},
{
"category": "external",
"summary": "SUSE Bug 1074631 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/1074631"
},
{
"category": "external",
"summary": "SUSE Bug 1211968 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/1211968"
},
{
"category": "external",
"summary": "SUSE Bug 931600 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/931600"
},
{
"category": "external",
"summary": "SUSE Bug 931698 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/931698"
},
{
"category": "external",
"summary": "SUSE Bug 931723 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/931723"
},
{
"category": "external",
"summary": "SUSE Bug 931845 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/931845"
},
{
"category": "external",
"summary": "SUSE Bug 932026 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/932026"
},
{
"category": "external",
"summary": "SUSE Bug 932483 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/932483"
},
{
"category": "external",
"summary": "SUSE Bug 934789 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/934789"
},
{
"category": "external",
"summary": "SUSE Bug 935033 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/935033"
},
{
"category": "external",
"summary": "SUSE Bug 935540 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/935540"
},
{
"category": "external",
"summary": "SUSE Bug 935979 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/935979"
},
{
"category": "external",
"summary": "SUSE Bug 937202 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/937202"
},
{
"category": "external",
"summary": "SUSE Bug 937766 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/937766"
},
{
"category": "external",
"summary": "SUSE Bug 938248 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/938248"
},
{
"category": "external",
"summary": "SUSE Bug 938432 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/938432"
},
{
"category": "external",
"summary": "SUSE Bug 938895 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/938895"
},
{
"category": "external",
"summary": "SUSE Bug 938905 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/938905"
},
{
"category": "external",
"summary": "SUSE Bug 938906 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/938906"
},
{
"category": "external",
"summary": "SUSE Bug 938913 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/938913"
},
{
"category": "external",
"summary": "SUSE Bug 938945 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/938945"
},
{
"category": "external",
"summary": "SUSE Bug 943664 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/943664"
},
{
"category": "external",
"summary": "SUSE Bug 944729 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/944729"
},
{
"category": "external",
"summary": "SUSE Bug 945582 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/945582"
},
{
"category": "external",
"summary": "SUSE Bug 955589 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/955589"
},
{
"category": "external",
"summary": "SUSE Bug 980406 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/980406"
},
{
"category": "external",
"summary": "SUSE Bug 990592 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/990592"
},
{
"category": "external",
"summary": "SUSE Bug 994144 for CVE-2015-4000",
"url": "https://bugzilla.suse.com/994144"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2015-4000"
},
{
"cve": "CVE-2016-4979",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4979"
}
],
"notes": [
{
"category": "general",
"text": "The Apache HTTP Server 2.4.18 through 2.4.20, when mod_http2 and mod_ssl are enabled, does not properly recognize the \"SSLVerifyClient require\" directive for HTTP/2 request authorization, which allows remote attackers to bypass intended access restrictions by leveraging the ability to send multiple requests over a single connection and aborting a renegotiation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4979",
"url": "https://www.suse.com/security/cve/CVE-2016-4979"
},
{
"category": "external",
"summary": "SUSE Bug 987365 for CVE-2016-4979",
"url": "https://bugzilla.suse.com/987365"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:apache2-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-devel-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-doc-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-event-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-example-pages-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-prefork-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-utils-2.4.23-4.1.x86_64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.aarch64",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.ppc64le",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.s390x",
"openSUSE Tumbleweed:apache2-worker-2.4.23-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-4979"
}
]
}
FKIE_CVE-2009-1891
Vulnerability from fkie_nvd - Published: 2009-07-10 15:30 - Updated: 2025-04-09 00:30| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712 | Exploit | |
| secalert@redhat.com | http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html | Broken Link, Mailing List | |
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html | Mailing List, Third Party Advisory | |
| secalert@redhat.com | http://marc.info/?l=apache-httpd-dev&m=124621326524824&w=2 | Exploit, Issue Tracking, Mailing List, Third Party Advisory | |
| secalert@redhat.com | http://marc.info/?l=apache-httpd-dev&m=124661528519546&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=129190899612998&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| secalert@redhat.com | http://marc.info/?l=bugtraq&m=130497311408250&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| secalert@redhat.com | http://osvdb.org/55782 | Broken Link | |
| secalert@redhat.com | http://secunia.com/advisories/35721 | Not Applicable, Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/35781 | Not Applicable, Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/35793 | Not Applicable, Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/35865 | Not Applicable, Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/37152 | Not Applicable, Vendor Advisory | |
| secalert@redhat.com | http://secunia.com/advisories/37221 | Not Applicable, Vendor Advisory | |
| secalert@redhat.com | http://security.gentoo.org/glsa/glsa-200907-04.xml | Third Party Advisory | |
| secalert@redhat.com | http://support.apple.com/kb/HT3937 | Broken Link | |
| secalert@redhat.com | http://wiki.rpath.com/Advisories:rPSA-2009-0142 | Broken Link | |
| secalert@redhat.com | http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0142 | Broken Link | |
| secalert@redhat.com | http://www-01.ibm.com/support/docview.wss?uid=swg1PK91361 | Third Party Advisory | |
| secalert@redhat.com | http://www-01.ibm.com/support/docview.wss?uid=swg1PK99480 | Third Party Advisory | |
| secalert@redhat.com | http://www.debian.org/security/2009/dsa-1834 | Third Party Advisory | |
| secalert@redhat.com | http://www.mandriva.com/security/advisories?name=MDVSA-2009:149 | Broken Link, Patch | |
| secalert@redhat.com | http://www.redhat.com/support/errata/RHSA-2009-1156.html | Third Party Advisory | |
| secalert@redhat.com | http://www.securityfocus.com/archive/1/507857/100/0/threaded | Third Party Advisory, VDB Entry | |
| secalert@redhat.com | http://www.securitytracker.com/id?1022529 | Broken Link, Third Party Advisory, VDB Entry | |
| secalert@redhat.com | http://www.ubuntu.com/usn/USN-802-1 | Third Party Advisory | |
| secalert@redhat.com | http://www.vupen.com/english/advisories/2009/1841 | Permissions Required, Vendor Advisory | |
| secalert@redhat.com | http://www.vupen.com/english/advisories/2009/3184 | Permissions Required, Vendor Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=509125 | Issue Tracking, Patch, Third Party Advisory | |
| secalert@redhat.com | https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E | ||
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12361 | Third Party Advisory | |
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8632 | Third Party Advisory | |
| secalert@redhat.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9248 | Third Party Advisory | |
| secalert@redhat.com | https://rhn.redhat.com/errata/RHSA-2009-1148.html | Third Party Advisory | |
| secalert@redhat.com | https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01363.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712 | Exploit | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html | Broken Link, Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=apache-httpd-dev&m=124621326524824&w=2 | Exploit, Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=apache-httpd-dev&m=124661528519546&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=129190899612998&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=130497311408250&w=2 | Issue Tracking, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/55782 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35721 | Not Applicable, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35781 | Not Applicable, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35793 | Not Applicable, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/35865 | Not Applicable, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37152 | Not Applicable, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/37221 | Not Applicable, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-200907-04.xml | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT3937 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/Advisories:rPSA-2009-0142 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0142 | Broken Link | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg1PK91361 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg1PK99480 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2009/dsa-1834 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2009:149 | Broken Link, Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2009-1156.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/507857/100/0/threaded | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1022529 | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-802-1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/1841 | Permissions Required, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/3184 | Permissions Required, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=509125 | Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12361 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8632 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9248 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://rhn.redhat.com/errata/RHSA-2009-1148.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01363.html | Mailing List, Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| apache | http_server | * | |
| apache | http_server | * | |
| debian | debian_linux | 4.0 | |
| debian | debian_linux | 5.0 | |
| debian | debian_linux | 6.0 | |
| fedoraproject | fedora | 11 | |
| canonical | ubuntu_linux | 6.06 | |
| canonical | ubuntu_linux | 8.04 | |
| canonical | ubuntu_linux | 8.10 | |
| canonical | ubuntu_linux | 9.04 | |
| redhat | enterprise_linux_desktop | 5.0 | |
| redhat | enterprise_linux_eus | 5.3 | |
| redhat | enterprise_linux_server | 5.0 | |
| redhat | enterprise_linux_server_aus | 5.3 | |
| redhat | enterprise_linux_workstation | 5.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "838655CB-43E7-4BDA-A80C-2314C9870717",
"versionEndExcluding": "2.0.64",
"versionStartIncluding": "2.0.35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BBBCFC4-2CFE-42A2-BE6F-2710EB3921A9",
"versionEndExcluding": "2.2.12",
"versionStartIncluding": "2.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*",
"matchCriteriaId": "B3BB5EDB-520B-4DEF-B06E-65CA13152824",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
"matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "941713DB-B1DE-4953-9A9C-174EAFDCB3E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1F87B994-28E4-4095-8770-6433DE9C93AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption)."
},
{
"lang": "es",
"value": "El m\u00f3dulo mod_deflate en Apache httpd v2.2.11 y anteriores comprime archivos de gran tama\u00f1o hasta finalizar incluso despu\u00e9s de que la conexi\u00f3n de red asociada est\u00e1 cerrada, lo cual permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de CPU)."
}
],
"id": "CVE-2009-1891",
"lastModified": "2025-04-09T00:30:58.490",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2009-07-10T15:30:00.187",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Exploit"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=apache-httpd-dev\u0026m=124621326524824\u0026w=2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=apache-httpd-dev\u0026m=124661528519546\u0026w=2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=129190899612998\u0026w=2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://osvdb.org/55782"
},
{
"source": "secalert@redhat.com",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35721"
},
{
"source": "secalert@redhat.com",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35781"
},
{
"source": "secalert@redhat.com",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35793"
},
{
"source": "secalert@redhat.com",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35865"
},
{
"source": "secalert@redhat.com",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37152"
},
{
"source": "secalert@redhat.com",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37221"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200907-04.xml"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://support.apple.com/kb/HT3937"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://wiki.rpath.com/Advisories:rPSA-2009-0142"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0142"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK91361"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK99480"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2009/dsa-1834"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Patch"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:149"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1156.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/507857/100/0/threaded"
},
{
"source": "secalert@redhat.com",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1022529"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-802-1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Permissions Required",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1841"
},
{
"source": "secalert@redhat.com",
"tags": [
"Permissions Required",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12361"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8632"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9248"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1148.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01363.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Mailing List"
],
"url": "http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=apache-httpd-dev\u0026m=124621326524824\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=apache-httpd-dev\u0026m=124661528519546\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=129190899612998\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://osvdb.org/55782"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35721"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35781"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35793"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35865"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37152"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/37221"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://security.gentoo.org/glsa/glsa-200907-04.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://support.apple.com/kb/HT3937"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://wiki.rpath.com/Advisories:rPSA-2009-0142"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0142"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK91361"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK99480"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2009/dsa-1834"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Patch"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:149"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2009-1156.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/507857/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id?1022529"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-802-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1841"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12361"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8632"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9248"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://rhn.redhat.com/errata/RHSA-2009-1148.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01363.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
VAR-200907-0693
Vulnerability from variot - Updated: 2026-04-10 22:08The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption). (DoS) There is a vulnerability that becomes a condition.Service operation disruption to a third party (DoS) There is a possibility of being put into a state. The Apache 'mod_deflate' module is prone to a denial-of-service vulnerability. Successful exploits may allow remote attackers to cause denial-of-service conditions and prevent legitimate users from accessing the services. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Mandriva Linux Security Advisory MDVSA-2009:323 http://www.mandriva.com/security/
Package : apache Date : December 7, 2009 Affected: 2008.0
Problem Description:
Multiple vulnerabilities has been found and corrected in apache:
Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to cause a denial of service (memory consumption) via multiple calls, as demonstrated by initial SSL client handshakes to the Apache HTTP Server mod_ssl that specify a compression algorithm (CVE-2008-1678). Note that this security issue does not really apply as zlib compression is not enabled in the openssl build provided by Mandriva, but apache is patched to address this issue anyway (conserns 2008.1 only).
Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via wildcards in a pathname in an FTP URI (CVE-2008-2939). Note that this security issue was initially addressed with MDVSA-2008:195 but the patch fixing the issue was added but not applied in 2009.0.
The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file (CVE-2009-1195).
Fix a potential Denial-of-Service attack against mod_deflate or other modules, by forcing the server to consume CPU time in compressing a large file after a client disconnects (CVE-2009-1891).
The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11. NOTE: as of 20090903, this disclosure has no actionable information. However, because the VulnDisco Pack author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes (CVE-2009-3095).
Apache is affected by SSL injection or man-in-the-middle attacks due to a design flaw in the SSL and/or TLS protocols. A short term solution was released Sat Nov 07 2009 by the ASF team to mitigate these problems. Apache will now reject in-session renegotiation (CVE-2009-3555).
Packages for 2008.0 are being provided due to extended support for Corporate products.
This update provides a solution to these vulnerabilities.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1678 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1191 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555 http://marc.info/?l=apache-httpd-announce&m=125755783724966&w=2
Updated Packages:
Mandriva Linux 2008.0: dd2bebdd6726d2d865331d37068a90b7 2008.0/i586/apache-base-2.2.6-8.3mdv2008.0.i586.rpm 6de9d36a91b125cc03bafe911b7a38a2 2008.0/i586/apache-devel-2.2.6-8.3mdv2008.0.i586.rpm ab7963efad1b7951c94a24075a2070e7 2008.0/i586/apache-htcacheclean-2.2.6-8.3mdv2008.0.i586.rpm 42a53b597d5547fb88b7427cacd617a1 2008.0/i586/apache-mod_authn_dbd-2.2.6-8.3mdv2008.0.i586.rpm 1dff9d313e93c94e907d8c72348ed2e0 2008.0/i586/apache-mod_cache-2.2.6-8.3mdv2008.0.i586.rpm b575ede2978ad47e41d355bd8b192725 2008.0/i586/apache-mod_dav-2.2.6-8.3mdv2008.0.i586.rpm 8ff3dee24d2d2d9a8d13e567cf1eaced 2008.0/i586/apache-mod_dbd-2.2.6-8.3mdv2008.0.i586.rpm 7bae541dfec14b21700878514750de83 2008.0/i586/apache-mod_deflate-2.2.6-8.3mdv2008.0.i586.rpm 19cab766a26ce53bd7e7973ed92f0db4 2008.0/i586/apache-mod_disk_cache-2.2.6-8.3mdv2008.0.i586.rpm a1336e4ab4f282c388d7565bde4557fd 2008.0/i586/apache-mod_file_cache-2.2.6-8.3mdv2008.0.i586.rpm 6b2f2eb949977349390fa3b06cf257e7 2008.0/i586/apache-mod_ldap-2.2.6-8.3mdv2008.0.i586.rpm 3640bbef5262ec0407126e31dd5ddde3 2008.0/i586/apache-mod_mem_cache-2.2.6-8.3mdv2008.0.i586.rpm 98793747365606baabc08f22e36a0a04 2008.0/i586/apache-mod_proxy-2.2.6-8.3mdv2008.0.i586.rpm d7fe4d88f25d2a01b0809ab5292b0999 2008.0/i586/apache-mod_proxy_ajp-2.2.6-8.3mdv2008.0.i586.rpm 4c9f48adbd0b1d45a874f06b9275ebe3 2008.0/i586/apache-mod_ssl-2.2.6-8.3mdv2008.0.i586.rpm e5a1d9476316ccc9f183cb1ae5bbcf31 2008.0/i586/apache-modules-2.2.6-8.3mdv2008.0.i586.rpm 44f7810695a40519c68930695829f124 2008.0/i586/apache-mod_userdir-2.2.6-8.3mdv2008.0.i586.rpm d6f666e9954422664d1f029fc147b591 2008.0/i586/apache-mpm-event-2.2.6-8.3mdv2008.0.i586.rpm 75e205ddbc9313b8d02519e57919923a 2008.0/i586/apache-mpm-itk-2.2.6-8.3mdv2008.0.i586.rpm 6d68e8fa7baccc2ad090c703fb33458e 2008.0/i586/apache-mpm-prefork-2.2.6-8.3mdv2008.0.i586.rpm 331f18ce48403472fc7f8af6d5daee8e 2008.0/i586/apache-mpm-worker-2.2.6-8.3mdv2008.0.i586.rpm c75e69bcabc104938cb9033e591d1de8 2008.0/i586/apache-source-2.2.6-8.3mdv2008.0.i586.rpm 23fcdf29e21b0146fb5646baca2fa63b 2008.0/SRPMS/apache-2.2.6-8.3mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64: 3d4afe3f8da8369d80b6c195e132c5c0 2008.0/x86_64/apache-base-2.2.6-8.3mdv2008.0.x86_64.rpm 37034ee7c7eb813de2a00a6945a10248 2008.0/x86_64/apache-devel-2.2.6-8.3mdv2008.0.x86_64.rpm ba296f9aa229a616a2c406d1a16912c3 2008.0/x86_64/apache-htcacheclean-2.2.6-8.3mdv2008.0.x86_64.rpm 77fa75d36e7a4bbe154c846e3271e7a3 2008.0/x86_64/apache-mod_authn_dbd-2.2.6-8.3mdv2008.0.x86_64.rpm ca29e2db08b29e319f2392b46ea4c3fe 2008.0/x86_64/apache-mod_cache-2.2.6-8.3mdv2008.0.x86_64.rpm 3fbf5a0276adaa2d887a92482d81313f 2008.0/x86_64/apache-mod_dav-2.2.6-8.3mdv2008.0.x86_64.rpm 9c66e471c2d2d3e43462302d0cc6f1c9 2008.0/x86_64/apache-mod_dbd-2.2.6-8.3mdv2008.0.x86_64.rpm 05020102a26a28b96319b23e3b6e43d6 2008.0/x86_64/apache-mod_deflate-2.2.6-8.3mdv2008.0.x86_64.rpm 7191542417b30ed77334f1b8366628aa 2008.0/x86_64/apache-mod_disk_cache-2.2.6-8.3mdv2008.0.x86_64.rpm f4177dbdcfd2e3dc8e66be731ad731c4 2008.0/x86_64/apache-mod_file_cache-2.2.6-8.3mdv2008.0.x86_64.rpm fea417664f0a2689fa12308bd80c2fe4 2008.0/x86_64/apache-mod_ldap-2.2.6-8.3mdv2008.0.x86_64.rpm 9cf956fa426e6bdf6497337b6e26a2ab 2008.0/x86_64/apache-mod_mem_cache-2.2.6-8.3mdv2008.0.x86_64.rpm 0d9d04ca878bb3f19f4764152da42d82 2008.0/x86_64/apache-mod_proxy-2.2.6-8.3mdv2008.0.x86_64.rpm dbbcd75dd83779f54f98fa3e16b59f13 2008.0/x86_64/apache-mod_proxy_ajp-2.2.6-8.3mdv2008.0.x86_64.rpm dce8db6742ba28a71e18b86bb38688c8 2008.0/x86_64/apache-mod_ssl-2.2.6-8.3mdv2008.0.x86_64.rpm 2ff69d6e9c2cd3250f6746d4a7d921fd 2008.0/x86_64/apache-modules-2.2.6-8.3mdv2008.0.x86_64.rpm f298827d4dfa631a77907f7f5733fa29 2008.0/x86_64/apache-mod_userdir-2.2.6-8.3mdv2008.0.x86_64.rpm 6f02fb080e308ca0826fdb1ef00a1489 2008.0/x86_64/apache-mpm-event-2.2.6-8.3mdv2008.0.x86_64.rpm b886d30d73c60a515b3ed36d7f186378 2008.0/x86_64/apache-mpm-itk-2.2.6-8.3mdv2008.0.x86_64.rpm 62d7754a5aa7af596cc06cd540d4025f 2008.0/x86_64/apache-mpm-prefork-2.2.6-8.3mdv2008.0.x86_64.rpm d3438e0967978e580be896bd85f1d953 2008.0/x86_64/apache-mpm-worker-2.2.6-8.3mdv2008.0.x86_64.rpm e72af335ec7c3c02b5a494fbd6e99e0e 2008.0/x86_64/apache-source-2.2.6-8.3mdv2008.0.x86_64.rpm 23fcdf29e21b0146fb5646baca2fa63b 2008.0/SRPMS/apache-2.2.6-8.3mdv2008.0.src.rpm
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFLHQcamqjQ0CJFipgRAsJgAKDf5oc5UbEz3j+qsMn3tL6F8cujygCfY+cu MUj4lK2Wsb+qzbv2V+Ih30U= =VdZS -----END PGP SIGNATURE----- .
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-servers/apache < 2.2.11-r2 >= 2.2.11-r2
Description
Multiple vulnerabilities have been discovered in the Apache HTTP server:
-
Jonathan Peatfield reported that the "Options=IncludesNoEXEC" argument to the "AllowOverride" directive is not processed properly (CVE-2009-1195).
-
Sander de Boer discovered that the AJP proxy module (mod_proxy_ajp) does not correctly handle POST requests that do not contain a request body (CVE-2009-1191).
Impact
A local attacker could circumvent restrictions put up by the server administrator and execute arbitrary commands with the privileges of the user running the Apache server.
Workaround
Remove "include", "mod_proxy_ajp", "mod_proxy_http" and "deflate" from APACHE2_MODULES in make.conf and rebuild Apache, or disable the aforementioned modules in the Apache configuration.
Resolution
All Apache users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-servers/apache-2.2.11-r2"
References
[ 1 ] CVE-2009-1195 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195 [ 2 ] CVE-2009-1191 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1191 [ 3 ] CVE-2009-1890 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890 [ 4 ] CVE-2009-1891 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-200907-04.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at http://bugs.gentoo.org.
License
Copyright 2009 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c02824490 Version: 1
HPSBOV02683 SSRT090208 rev.1 - HP Secure Web Server (SWS) for OpenVMS running Apache/PHP, Remote Denial of Service (DoS), Unauthorized Access, Unauthorized Disclosure of Information, Unauthorized Modification
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2011-05-05 Last Updated: 2011-05-05
Potential Security Impact: Remote Denial of Service (DoS), unauthorized access, unauthorized disclosure of information, unauthorized modification
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY Potential vulnerabilities have been identified with HP Secure Web Server (SWS) for OpenVMS running Apache and PHP. The vulnerabilities could be remotely exploited to create a Denial of Service (DoS), unauthorized access, unauthorized disclosure of information, or unauthorized modifications.
References: CVE-2002-0839, CVE-2002-0840, CVE-2003-0542, CVE-2004-0492, CVE-2005-2491, CVE-2005-3352, CVE-2005-3357, CVE-2006-2937, CVE-2006-2940, CVE-2006-3738, CVE-2006-3747, CVE-2006-3918, CVE-2006-4339, CVE-2006-4343, CVE-2007-5000, CVE-2007-6388, CVE-2008-0005, CVE-2009-1891, CVE-2009-3095, CVE-2009-3291, CVE-2009-3292, CVE-2009-3293, CVE-2009-3555, CVE-2010-0010
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP Secure Web Server (SWS) for OpenVMS (based on Apache) V2.1-1 and earlier.
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2002-0839 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2 CVE-2002-0840 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 CVE-2003-0542 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2 CVE-2004-0492 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2005-2491 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2005-3352 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2005-3357 (AV:N/AC:H/Au:N/C:N/I:N/A:C) 5.4 CVE-2006-2937 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8 CVE-2006-2940 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8 CVE-2006-3738 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2006-3747 (AV:N/AC:H/Au:N/C:C/I:C/A:C) 7.6 CVE-2006-3918 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2006-4339 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3 CVE-2006-4343 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3 CVE-2007-5000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2007-6388 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2008-0005 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3 CVE-2009-1891 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1 CVE-2009-3095 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2009-3291 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2009-3292 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2009-3293 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 CVE-2009-3555 (AV:N/AC:M/Au:N/C:N/I:P/A:P) 5.8 CVE-2010-0010 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has made the following software updates available to resolve these vulnerabilities.
Kit Name Location
HP SWS V2.2 for OpenVMS Alpha and OpenVMS Integrity servers. http://h71000.www7.hp.com/openvms/products/ips/apache/csws.html
CSWS_PHP V2.2 http://h71000.www7.hp.com/openvms/products/ips/apache/csws_php.html
HISTORY Version:1 (rev.1) - 5 May 2011 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches -check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems -verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do
- The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title:
GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
Copyright 2011 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux)
iEUEARECAAYFAk3C8qwACgkQ4B86/C0qfVnBqgCYtJgc2OLmG0JEGU4sCpzntC4E HACgjeWEt9Ja5qNdjhL5iwOp3JVtVic= =EvRT -----END PGP SIGNATURE----- . This issue did not affect Debian 4.0 "etch". This would cause mod_deflate to consume large amounts of CPU if mod_deflate was enabled for a large file. A similar flaw related to HEAD requests for compressed content was also fixed. (CVE-2009-1891)
For the stable distribution (lenny), these problems have been fixed in version 2.2.9-10+lenny4.
The oldstable distribution (etch), these problems have been fixed in version 2.2.3-4+etch9.
For the testing distribution (squeeze) and the unstable distribution (sid), these problems will be fixed in version 2.2.11-7.
This advisory also provides updated apache2-mpm-itk packages which have been recompiled against the new apache2 packages.
Updated packages for the s390 and mipsel architectures are not included yet. They will be released as soon as they become available.
Upgrade instructions
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
If you are using the apt-get package manager, use the line for sources.list as given below:
apt-get update will update the internal database apt-get upgrade will install corrected packages
You may use an automated update by adding the resources from the footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
Source archives:
http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3-4+etch9.diff.gz Size/MD5 checksum: 127065 2705ba251cdd2e979ce85099b4548848 http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3-4+etch9.dsc Size/MD5 checksum: 1068 5090ccfce8dc2e193a0200a5046fc0c2 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3.diff.gz Size/MD5 checksum: 12705 7327720850092af23dae939c8b6e0268 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01.orig.tar.gz Size/MD5 checksum: 29071 63daaf8812777aacfd5a31ead4ff0061 http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3.orig.tar.gz Size/MD5 checksum: 6342475 f72ffb176e2dc7b322be16508c09f63c http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3.dsc Size/MD5 checksum: 676 3823620d6958a99e0d9bf8d54172071e
Architecture independent packages:
http://security.debian.org/pool/updates/main/a/apache2/apache2-src_2.2.3-4+etch9_all.deb Size/MD5 checksum: 6666600 863bd8f5274dcca2b348ddfb455f1e98 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-perchild_2.2.3-4+etch9_all.deb Size/MD5 checksum: 274258 632e77496c06ac55702187083210c5bd http://security.debian.org/pool/updates/main/a/apache2/apache2-doc_2.2.3-4+etch9_all.deb Size/MD5 checksum: 2243400 3c97cd0ed50e13730082455509ccf2ea http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3-4+etch9_all.deb Size/MD5 checksum: 41428 765f1df6239124b257a17373ec12a25c
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_alpha.deb Size/MD5 checksum: 184750 a5ab12e5997c22cc5384f4dd57039bf0 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_alpha.deb Size/MD5 checksum: 406786 9327ff1f134980e38e8af0a9bd333744 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_alpha.deb Size/MD5 checksum: 345748 e6aa3a131e39ea0da098cd68e769ca7b http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_alpha.deb Size/MD5 checksum: 407410 1f8fa482173f33fbf635c4d4b622d6dd http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_alpha.deb Size/MD5 checksum: 449496 f4bb6824e49f741d853b80c6cd1c34be http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_alpha.deb Size/MD5 checksum: 444670 26e6f91f3f21c9c3ce178abff526f8d6 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_alpha.deb Size/MD5 checksum: 1016848 234579bc27e5372455df962ae77da5ea http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_alpha.deb Size/MD5 checksum: 450004 8d41f42126489a657627549f3fd03236
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_amd64.deb Size/MD5 checksum: 408082 af95e2d0f5daba30588d20bee6ea1374 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_amd64.deb Size/MD5 checksum: 408766 8769e1922010d061afd64b917bf9ebfb http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_amd64.deb Size/MD5 checksum: 436036 83d55a3ec28d1d2954d5c524ace972ed http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_amd64.deb Size/MD5 checksum: 999314 86e7fb785110434ba47a93ad08dfbb46 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_amd64.deb Size/MD5 checksum: 432016 34bea3d8a903690047c0ce17dff9d0a8 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_amd64.deb Size/MD5 checksum: 172540 7e6a45df8e195f3871b1d5f333a832d7 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_amd64.deb Size/MD5 checksum: 341900 59846089ce413189c2a999b46ff9022c http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_amd64.deb Size/MD5 checksum: 436510 c697b045a1b6643f4aca8f75b6019688
arm architecture (ARM)
http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_arm.deb Size/MD5 checksum: 346122 69dc7042a32293cf61c6a037a0defcf2 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_arm.deb Size/MD5 checksum: 966476 cfe3ffb085393e3ed0d4c58a078b21c2 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_arm.deb Size/MD5 checksum: 422504 19091c57d38578606c074f637f5b9b77 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_arm.deb Size/MD5 checksum: 421738 91f192b72202b0266f64e418c6ecf419 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_arm.deb Size/MD5 checksum: 411030 5be3b5b0a332a274f16ac9fcfbfed59c http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_arm.deb Size/MD5 checksum: 411766 84009ab4d2335289437a721b2828f66e http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_arm.deb Size/MD5 checksum: 157456 c025f46f6df32cc58eb44c1fe43a0b95 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_arm.deb Size/MD5 checksum: 418168 90253c45e4e2ddd858144f0df7083881
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_hppa.deb Size/MD5 checksum: 443192 062ef8c245a4d94bff4ffaa7de4e80bc http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_hppa.deb Size/MD5 checksum: 1078368 3796cc564424fa9302f59ecdfb609e07 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_hppa.deb Size/MD5 checksum: 351892 a140b65fb1cd39922347fa9c3bfd3378 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_hppa.deb Size/MD5 checksum: 439772 d654376818ab21c08354d91354f774e4 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_hppa.deb Size/MD5 checksum: 410632 a287c471fe93b308f6b11262cd7a9f5a http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_hppa.deb Size/MD5 checksum: 409756 41555f1eb2b8a1f506b72521a45da883 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_hppa.deb Size/MD5 checksum: 443650 e1ce0eaf55fb5f75061ec379d86ed00f http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_hppa.deb Size/MD5 checksum: 179276 41098929aec66df2eb6aff15c65d185b
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_i386.deb Size/MD5 checksum: 423714 80ff91b5681b3b65b9f82510b78995d8 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_i386.deb Size/MD5 checksum: 342508 473c50b8e3b3ff72f61fd2773ad0a5ec http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_i386.deb Size/MD5 checksum: 419898 3efc018978b3f6879d4e17cd870da7c6 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_i386.deb Size/MD5 checksum: 962488 9f79ca5450eb153eeb77d0ccdf63af53 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_i386.deb Size/MD5 checksum: 424256 f7df4f2e8308b37945d6c9350fb68059 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_i386.deb Size/MD5 checksum: 160954 7bced5cbbed7133d3e7792b0aa40673c http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_i386.deb Size/MD5 checksum: 410094 c973180a87c19636cc18823d872eaaf5 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_i386.deb Size/MD5 checksum: 409096 aca126fc936879a914786d64b39582f1
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_ia64.deb Size/MD5 checksum: 231658 8588ce0e7b8f4ac4a486c3ee1f7e3f98 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_ia64.deb Size/MD5 checksum: 407390 c0070cc353345e43208362eb4b59fde2 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_ia64.deb Size/MD5 checksum: 490872 0e1504ba3f45642856d2fa0b961f8700 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_ia64.deb Size/MD5 checksum: 1203918 a0f6cbde5068600b39a1ecd4ec6a5b47 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_ia64.deb Size/MD5 checksum: 497934 5c8cd8e03d196f3bf950c11c48c4ee8b http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_ia64.deb Size/MD5 checksum: 360406 db46e71e165212b10d2fbda1a606cd98 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_ia64.deb Size/MD5 checksum: 497114 289213d2c49b217caf6a35d69f63e1e7 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_ia64.deb Size/MD5 checksum: 406772 84111944453e85d3abf713ae51826439
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_mips.deb Size/MD5 checksum: 170220 026044026baf1ce8467698a2a73aa5ab http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_mips.deb Size/MD5 checksum: 407938 b64b7c8cbc89b5a53ec2aaa58afec391 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_mips.deb Size/MD5 checksum: 433466 cbb48f0d929ce882c39d76966ba70193 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_mips.deb Size/MD5 checksum: 434190 ce951039761e140b5886fe57a255fa44 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_mips.deb Size/MD5 checksum: 348326 a718aad2980aa88aacd1d521c41de077 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_mips.deb Size/MD5 checksum: 409050 d35c3c4676678eb03b9661484051b391 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_mips.deb Size/MD5 checksum: 976346 6a45c13a7402ec443a17760e26483bf8 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_mips.deb Size/MD5 checksum: 429286 1bd2eed2169f0de38f651821aaa3da3b
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_powerpc.deb Size/MD5 checksum: 432192 906d504de8f20bc6c8ad1469a837e195 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_powerpc.deb Size/MD5 checksum: 406780 1e83caee969de1766eb5fc6067e76696 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_powerpc.deb Size/MD5 checksum: 427394 8a6ca2bdba868fdebeee23dda1f72701 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_powerpc.deb Size/MD5 checksum: 431602 90b2195a707a5b67745eabef4c2a8768 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_powerpc.deb Size/MD5 checksum: 1035070 0c620f29ceab742f65dad5eaf1d9d4f4 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_powerpc.deb Size/MD5 checksum: 353950 a0ba6038b988595e5a23dd1fb7639c4c http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_powerpc.deb Size/MD5 checksum: 407402 f0288619d689fc7dcf60860a4f36a933 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_powerpc.deb Size/MD5 checksum: 167642 c30002dbdc362dd5467146d1937dea53
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_sparc.deb Size/MD5 checksum: 418730 48e4d2f03309d7b24e3cde05a5b71a21 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_sparc.deb Size/MD5 checksum: 408606 1578768e504d10048c569485d9606289 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_sparc.deb Size/MD5 checksum: 157718 452a1e8f879fbc6d63a553d6baec602d http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_sparc.deb Size/MD5 checksum: 343654 ac6444870699cc33ad7f961eed9398ce http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_sparc.deb Size/MD5 checksum: 422500 5a8ce79508be63aa69c4df345bb0cee0 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_sparc.deb Size/MD5 checksum: 959220 b771edecfb5c7813eca216bfe66a3898 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_sparc.deb Size/MD5 checksum: 422118 6565c943000320159110ac22dcd5f559 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_sparc.deb Size/MD5 checksum: 409490 c1a6eba5bc28035aa796688e47e5e4dc
Debian GNU/Linux 5.0 alias lenny
Source archives:
http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2.dsc Size/MD5 checksum: 1164 307984cde328f4d612ab19f783850723 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2.diff.gz Size/MD5 checksum: 13140 adfb807359e881c02f62c979a1f3728b http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02.orig.tar.gz Size/MD5 checksum: 33295 1da861a142f8d0d2e2a5bfbc7c760199 http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny4.diff.gz Size/MD5 checksum: 138623 e83f70e3fe9dc21e23b9e12e0e3509a2 http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny4.dsc Size/MD5 checksum: 1673 3edbeef1b78cdcb238a1b156b1e15bb3 http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9.orig.tar.gz Size/MD5 checksum: 6396996 80d3754fc278338033296f0d41ef2c04
Architecture independent packages:
http://security.debian.org/pool/updates/main/a/apache2/apache2-src_2.2.9-10+lenny4_all.deb Size/MD5 checksum: 6734400 79b3f9d5db6aa727567fbe8465ff90d4 http://security.debian.org/pool/updates/main/a/apache2/apache2-doc_2.2.9-10+lenny4_all.deb Size/MD5 checksum: 2060300 196001254f77a940ad90c9b71a852e77 http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny4_all.deb Size/MD5 checksum: 44714 bc0ebb5a9da11e825827315a6899abfb
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_alpha.deb Size/MD5 checksum: 847834 aaf8837f7c08aca3d011376dcffc7e16 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_alpha.deb Size/MD5 checksum: 147370 dbb9268ff94f758a080b6e8a05a4bdf2 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_alpha.deb Size/MD5 checksum: 261110 83e82a6a01480d834aa5339e24f5969a http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_alpha.deb Size/MD5 checksum: 256066 96f6245fa6e4ed746ef8262233f503ad http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_alpha.deb Size/MD5 checksum: 208196 6ee84eaafd8eb561b9a439dcbb783236 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_alpha.deb Size/MD5 checksum: 261798 a1229304be029b88e4f5c398f91f4e40 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_alpha.deb Size/MD5 checksum: 83944 8b74c4d4c39b5ac398710dab602337e2 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_alpha.deb Size/MD5 checksum: 209246 bc34fe81b34a34e0dc9f7ead8de8fe1a http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_alpha.deb Size/MD5 checksum: 198092 4881bbe2b0e5b4f348877e7ea627ce52 http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_alpha.deb Size/MD5 checksum: 2401116 319b1da984a7f71cc3c7a7a5ba49b867 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_alpha.deb Size/MD5 checksum: 82234 4c29b98521c49ac1ecbc8d6c011abdfa
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_amd64.deb Size/MD5 checksum: 144626 5d4768acfae476c402e6fc4691b4546e http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_amd64.deb Size/MD5 checksum: 209292 67863fa88619fd577003df2aa7cce0e0 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_amd64.deb Size/MD5 checksum: 82096 a98e3f9008a265b60353de3951e2e398 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_amd64.deb Size/MD5 checksum: 208304 57c865b54fb1cc86c4a8cfab227bc306 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_amd64.deb Size/MD5 checksum: 253304 074663f709a0bf0ee633455f80fee628 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_amd64.deb Size/MD5 checksum: 257894 6360df03503d90a3d3ce328b864e6f51 http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_amd64.deb Size/MD5 checksum: 2461864 89f24f597409e1c28c269d480c73e3e4 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_amd64.deb Size/MD5 checksum: 195110 701e3f4e5f285547da2812995f2633c6 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_amd64.deb Size/MD5 checksum: 257386 4d91795d2a2fad9cdf6b68339b4829b6 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_amd64.deb Size/MD5 checksum: 83788 5316f2c34b8b48c4add784cc76753456 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_amd64.deb Size/MD5 checksum: 814092 20325906f84a4e8fe2d44facc5b6b5d3
arm architecture (ARM)
http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_arm.deb Size/MD5 checksum: 2325038 1d76ab85e35d2cbba2f03e27a298e94c http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_arm.deb Size/MD5 checksum: 80888 86bf973a332a92a29382ee8a46a6c026 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_arm.deb Size/MD5 checksum: 785978 52f17dbf1fee0cd55ee9009fdd4f0fd8 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_arm.deb Size/MD5 checksum: 223420 dff6ac226c23cf2a09203988d7a2b9f1 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_arm.deb Size/MD5 checksum: 161996 1a897301ece23202fcfa1237255fc4d2 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_arm.deb Size/MD5 checksum: 82676 d9fbdef2dff08820870956f9657a58e6 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_arm.deb Size/MD5 checksum: 219532 71eacc1f45625b1df19e76d75e3ba3c6 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_arm.deb Size/MD5 checksum: 146788 ac12d8e6bdf36cb3dcdc25cb18e3e30a http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_arm.deb Size/MD5 checksum: 210508 a21d73a92f2afc9fe444e8605a17b217 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_arm.deb Size/MD5 checksum: 224274 522c6f94729d2a1dee88587c915d519d http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_arm.deb Size/MD5 checksum: 209360 e929d57bd87b4274b164957b1ddecd28
armel architecture (ARM EABI)
http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_armel.deb Size/MD5 checksum: 225576 b0dcffd0883f47503ccf734f18852ad0 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_armel.deb Size/MD5 checksum: 801902 185f8929c05f1908bcaa8b860f389578 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_armel.deb Size/MD5 checksum: 221418 c65a0ed2b6c24ca34b7b8eaf89b371d4 http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_armel.deb Size/MD5 checksum: 2339212 8774ee70034af693ad839a1a32cb8349 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_armel.deb Size/MD5 checksum: 162788 1af310dc30900cb2351f0b72700f1b6a http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_armel.deb Size/MD5 checksum: 83420 d8880a371ce336eb07ecdb6560658a9d http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_armel.deb Size/MD5 checksum: 150670 d78e5498f0eef77186479e10bb91b6b1 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_armel.deb Size/MD5 checksum: 213296 2bab992f24e1772284062500f3574524 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_armel.deb Size/MD5 checksum: 212144 216add040a936ef2981edc7d9561e114 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_armel.deb Size/MD5 checksum: 81784 cac9e229181c8437b445bdfb8812c3c4 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_armel.deb Size/MD5 checksum: 225852 ae8ac07aacb889e9f3e6c59c8b511fcf
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_hppa.deb Size/MD5 checksum: 183160 f2b39550c5f7e82e489c912166d9979e http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_hppa.deb Size/MD5 checksum: 152354 065c6e2360f9a561032ff001da648d4d http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_hppa.deb Size/MD5 checksum: 83830 de830f6d2a404e47907eff31c8e500f8 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_hppa.deb Size/MD5 checksum: 82196 16539b99fc2144c8bcfcd7af8d0ab185 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_hppa.deb Size/MD5 checksum: 246170 7d2bc68a96df307fed56456b73f03b66 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_hppa.deb Size/MD5 checksum: 246644 3047579aa5229cd6015dbb1e4235bd5e http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_hppa.deb Size/MD5 checksum: 888518 69936f2c0a47f50d1656d42a1f07be60 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_hppa.deb Size/MD5 checksum: 211744 a16842a731424f0da311c9ad06db1e6d http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_hppa.deb Size/MD5 checksum: 2380288 cd896ebb2704567cb74f3d0ee7e0eb4d http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_hppa.deb Size/MD5 checksum: 210730 716d95b564b12cf4a3a44d3b847d1718 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_hppa.deb Size/MD5 checksum: 241526 9e86d0c72e5c01770d5b9a403eea1931
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_i386.deb Size/MD5 checksum: 2321656 ec028a4db5a43f4ed9ad5be64752d03a http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_i386.deb Size/MD5 checksum: 236982 db7f962144ad83c02e89cf774292288b http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_i386.deb Size/MD5 checksum: 81826 14dc03b9022352f6ca89cc18d5a0330e http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_i386.deb Size/MD5 checksum: 178820 b6a82b00259627a7f7fb593d9b011766 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_i386.deb Size/MD5 checksum: 83576 1bada724cf9b6dd9f63c650467efeba9 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_i386.deb Size/MD5 checksum: 142984 a5f47b4e360f4dfb1af40edc0fd4b029 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_i386.deb Size/MD5 checksum: 212226 962c9711427d4b3040f2682cc76ab86a http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_i386.deb Size/MD5 checksum: 240950 d071d125f52595d24d7ce27a700125b2 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_i386.deb Size/MD5 checksum: 782590 91c5374730252660a652998778f37d8d http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_i386.deb Size/MD5 checksum: 210906 c3f8cc33efaf94bb394269a70c71a0d1 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_i386.deb Size/MD5 checksum: 240464 5354fbeaf0547f9a42bb15093325f549
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_ia64.deb Size/MD5 checksum: 311214 f283915f5e76d3cd640589d549a76a71 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_ia64.deb Size/MD5 checksum: 85302 ff6953155bfaf472969417b48b2551f8 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_ia64.deb Size/MD5 checksum: 1035884 aa5c4d97a05db590c5f3f2cf4d19c555 http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_ia64.deb Size/MD5 checksum: 2316556 d26cb59c9177ec0e71a95ad856d4e051 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_ia64.deb Size/MD5 checksum: 246932 42ab72304a76a62f65836b6c60c73010 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_ia64.deb Size/MD5 checksum: 312166 f58ecace375bd6b35f1a4062748c5408 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_ia64.deb Size/MD5 checksum: 209228 559adca455e0ef1f204e96ac4fbe49ef http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_ia64.deb Size/MD5 checksum: 162262 ba2b1c266c3587a302212bf4f2ed240f http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_ia64.deb Size/MD5 checksum: 208174 8c9fe75a24cde7114b2f7652537deecd http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_ia64.deb Size/MD5 checksum: 83422 1779b4541944fa8a94a1dd33e4cbc609 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_ia64.deb Size/MD5 checksum: 304150 4a2c480a73e0ed79b46b05b58fe0fd61
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_mips.deb Size/MD5 checksum: 83190 e093dfcad8021f25f7176da924459c6c http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_mips.deb Size/MD5 checksum: 170822 294522178e939a92592d5d146b68cd9d http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_mips.deb Size/MD5 checksum: 233580 961e112fcdeacc251dee947f8f724aa8 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_mips.deb Size/MD5 checksum: 232924 52a97e65bdccc87e309a82234ab89dab http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_mips.deb Size/MD5 checksum: 149230 9708268be4f09ba11e5bb51179d928f2 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_mips.deb Size/MD5 checksum: 779762 d2c17dcc02d84293914bb3f4f6ab67d3 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_mips.deb Size/MD5 checksum: 228990 a141cf37d468e74442cbcd7012925e44 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_mips.deb Size/MD5 checksum: 208192 33165f7a8cb46d7c296c248955128218 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_mips.deb Size/MD5 checksum: 209244 b016214150d6ce9a7e43e64a851f5978 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_mips.deb Size/MD5 checksum: 81522 1abe52816f5a0d8c00e3b2fb1879414f http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_mips.deb Size/MD5 checksum: 2463130 344c79f122bab946da9fc39f9a8a4b36
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_powerpc.deb Size/MD5 checksum: 257046 c952768064ed400bb2e1d9e27e4ba99a http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_powerpc.deb Size/MD5 checksum: 84070 e17bd8d31a36da03bef16415993e7e45 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_powerpc.deb Size/MD5 checksum: 915634 53944e6d790f63ca816bf2136b79af3e http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_powerpc.deb Size/MD5 checksum: 208218 b9e3f2e66531d56bb570424353272102 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_powerpc.deb Size/MD5 checksum: 82412 766b0d2515db8ffeb85dca4b484105f1 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_powerpc.deb Size/MD5 checksum: 160476 8d0ecf34f8000fd940c921a0b3d4e548 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_powerpc.deb Size/MD5 checksum: 209268 cf420bf9a74835ea64697f91b87803c4 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_powerpc.deb Size/MD5 checksum: 257776 b6177ff3288d6b330f88be5c66257fb0 http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_powerpc.deb Size/MD5 checksum: 2495370 fd4dd820e677dc7e70c76e1fab8e92f6 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_powerpc.deb Size/MD5 checksum: 252980 dc623a508aba2b5686b91b8dbaa960c8 http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_powerpc.deb Size/MD5 checksum: 195282 f195b72bd2cb69fd34dad3e784789140
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_s390.deb Size/MD5 checksum: 259520 fbaaf66f397575413ef453aa722144e8 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_s390.deb Size/MD5 checksum: 260108 2ae0ee8cc14adc7968258bd08a3e81ed http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_s390.deb Size/MD5 checksum: 822996 d30704ff33a6aa78bbbd45a6f7ac0143 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_s390.deb Size/MD5 checksum: 208180 38718b3016843e4c6143b42d3b305303 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_s390.deb Size/MD5 checksum: 150432 c4efb820040316a31f1b101c52234ead http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_s390.deb Size/MD5 checksum: 209230 7f38737a3435372a60be9bb1d55e28cb http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_s390.deb Size/MD5 checksum: 83810 b975c720b2dfef46c355d4c46fe11981 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_s390.deb Size/MD5 checksum: 82046 9c1ef780cb0b791585ca092084672204 http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_s390.deb Size/MD5 checksum: 2405236 abbada7447e8b5870bf8a8bf88a63ef2 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_s390.deb Size/MD5 checksum: 255468 ff853775f302788837c58af1e78992c6
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_sparc.deb Size/MD5 checksum: 177430 6fc629e355d1631ffb88b8614d9fea10 http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_sparc.deb Size/MD5 checksum: 2230948 0139ae6fb585ca7299549ff59e5317b8 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_sparc.deb Size/MD5 checksum: 210438 fe77b48974cfb980f1cbfd744cdab798 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_sparc.deb Size/MD5 checksum: 236456 2f7cf5cb7aa7eb2b40a914894c7aa883 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_sparc.deb Size/MD5 checksum: 83162 7c17c245241db944b85ca8972a19a785 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_sparc.deb Size/MD5 checksum: 240688 713eb6278ca62f82ed6837480fa278de http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_sparc.deb Size/MD5 checksum: 81388 b76095bbe6e716c35f6b1f2f76a35428 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_sparc.deb Size/MD5 checksum: 240168 6fa24064bf73b944fb41beea7b95f66e http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_sparc.deb Size/MD5 checksum: 211722 92acf170832b8d56e67dbd0760459e47 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_sparc.deb Size/MD5 checksum: 147228 a166a6f2e75dbedd9e3795af1b1f34af http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_sparc.deb Size/MD5 checksum: 780484 cfec1976f87aee4535b0de9df3410127
These files will probably be moved into the stable distribution on its next update. =========================================================== Ubuntu Security Notice USN-802-1 July 13, 2009 apache2 vulnerabilities CVE-2009-1890, CVE-2009-1891 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 8.10 Ubuntu 9.04
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 6.06 LTS: apache2-common 2.0.55-4ubuntu2.6 apache2-mpm-perchild 2.0.55-4ubuntu2.6 apache2-mpm-prefork 2.0.55-4ubuntu2.6 apache2-mpm-worker 2.0.55-4ubuntu2.6 libapr0 2.0.55-4ubuntu2.6
Ubuntu 8.04 LTS: apache2-mpm-event 2.2.8-1ubuntu0.10 apache2-mpm-perchild 2.2.8-1ubuntu0.10 apache2-mpm-prefork 2.2.8-1ubuntu0.10 apache2-mpm-worker 2.2.8-1ubuntu0.10 apache2.2-common 2.2.8-1ubuntu0.10
Ubuntu 8.10: apache2-mpm-event 2.2.9-7ubuntu3.2 apache2-mpm-prefork 2.2.9-7ubuntu3.2 apache2-mpm-worker 2.2.9-7ubuntu3.2 apache2.2-common 2.2.9-7ubuntu3.2
Ubuntu 9.04: apache2-mpm-event 2.2.11-2ubuntu2.2 apache2-mpm-prefork 2.2.11-2ubuntu2.2 apache2-mpm-worker 2.2.11-2ubuntu2.2 apache2.2-common 2.2.11-2ubuntu2.2
In general, a standard system upgrade is sufficient to effect the necessary changes. A remote attacker could exploit this and cause a denial of service via memory resource consumption. (CVE-2009-1891)
Updated packages for Ubuntu 6.06 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6.diff.gz
Size/MD5: 125440 0835eafec701c6f327e82270dca754a1
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6.dsc
Size/MD5: 1156 13cf43efabdc8e2180ade01709ff4063
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55.orig.tar.gz
Size/MD5: 6092031 45e32c9432a8e3cf4227f5af91b03622
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.0.55-4ubuntu2.6_all.deb
Size/MD5: 2125302 f97b87210dc35e7cf1b4014d755f5cc2
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.6_amd64.deb
Size/MD5: 833688 123cb5995bd422cf218db15691284ed2
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.6_amd64.deb
Size/MD5: 228978 33ea13f64f33acb69b73ad4c2fdfd9ff
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.6_amd64.deb
Size/MD5: 223958 e94df0f2fdcf8d0bf9e95d5149c58f73
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.6_amd64.deb
Size/MD5: 228556 4e0c0d0ff7fc315c30250fb3d828cdfd
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.6_amd64.deb
Size/MD5: 172066 1f4106b81cc09f4bd78e066aef94201b
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.6_amd64.deb
Size/MD5: 172850 3b433ffaca5e5e36f7ebc2881fd7f1a5
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.6_amd64.deb
Size/MD5: 94914 b872cbff9cda76856337a278dba5a9ca
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6_amd64.deb
Size/MD5: 36956 f628faa804ed2c2b5525952fbd94d5ca
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.6_amd64.deb
Size/MD5: 286398 3ebb11712b0466f2c3d0b5243d1a0339
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.6_amd64.deb
Size/MD5: 144970 a8e8615104349a395c695915079eab69
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.6_i386.deb
Size/MD5: 786908 1c3f456b2c87dcf5fd21c9e783f4d06d
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.6_i386.deb
Size/MD5: 203576 772d6129a7ef92cf5887c25466fda11b
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.6_i386.deb
Size/MD5: 199470 315e863b2ad6aa1b669e7914cebc38a8
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.6_i386.deb
Size/MD5: 203002 573f96a5d3787106c8d6007d8afb88f6
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.6_i386.deb
Size/MD5: 172066 57fcc673853907cc24c432ef8b0f8e94
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.6_i386.deb
Size/MD5: 172834 85320d327250cf86fd6c48813384bdc0
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.6_i386.deb
Size/MD5: 92862 d774e289f718d119dad6e765fd900679
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6_i386.deb
Size/MD5: 36958 9b8758253a277d81c02b1c9fd50b8eba
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.6_i386.deb
Size/MD5: 262426 668cbde23862b43743e935ca8ff24e8a
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.6_i386.deb
Size/MD5: 132884 f0bbccb2fc0f96b88b124c6942b9d957
powerpc architecture (Apple Macintosh G3/G4/G5):
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.6_powerpc.deb
Size/MD5: 859782 b3d991a69f5703d9e1339eafd0b5df17
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.6_powerpc.deb
Size/MD5: 220946 098441a8af78db25aea174320ffcd409
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.6_powerpc.deb
Size/MD5: 216552 a381af581b41112ac975fca40bec02e6
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.6_powerpc.deb
Size/MD5: 220496 0d5ff99a81d4581edca2effaf04f1473
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.6_powerpc.deb
Size/MD5: 172052 84e4b88525b4ce0923c898264dbfea5a
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.6_powerpc.deb
Size/MD5: 172850 159e27770e6f51e03f5284ea7f5ca190
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.6_powerpc.deb
Size/MD5: 104626 e320d5a9527e39d1998f7212db15825e
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6_powerpc.deb
Size/MD5: 36960 cdb428ea696ff7e0aaa972041839aef2
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.6_powerpc.deb
Size/MD5: 281970 80f4c670c5c142303b7da95ec7f86b25
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.6_powerpc.deb
Size/MD5: 142094 630a20d53c2ffe01b38c9c9e53badb37
sparc architecture (Sun SPARC/UltraSPARC):
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.6_sparc.deb
Size/MD5: 804084 1025f38adde2a04a719393d5693dbd68
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.6_sparc.deb
Size/MD5: 211136 73ae94138fb8b3e4dfbc1c9d5079a92c
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.6_sparc.deb
Size/MD5: 206806 431b7e7e3462e125d141ee9ec55a7825
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.6_sparc.deb
Size/MD5: 210416 a2ce963e90818b3093d990f4632c4e8a
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.6_sparc.deb
Size/MD5: 172070 8335845d072dc411e8e670807dc7c604
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.6_sparc.deb
Size/MD5: 172850 93e8d610d683005695699a153c40ce06
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.6_sparc.deb
Size/MD5: 93966 87d7968cec960afde5f9996803ac8a8a
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6_sparc.deb
Size/MD5: 36956 585634ecaa1af88b1d92ab48feed15f7
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.6_sparc.deb
Size/MD5: 268546 c2b2894973ed231bf0292100ca662ced
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.6_sparc.deb
Size/MD5: 130872 f109c1fe224df9957a8837358365c750
Updated packages for Ubuntu 8.04 LTS:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.10.diff.gz
Size/MD5: 135972 a2c9442eec99007779a145e71ba68b30
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.10.dsc
Size/MD5: 1381 54f6072ce246ebc26a350fb53e5c99bc
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8.orig.tar.gz
Size/MD5: 6125771 39a755eb0f584c279336387b321e3dfc
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.8-1ubuntu0.10_all.deb
Size/MD5: 1928676 7231ea6584bc9b64c87d84a2fd7e5d00
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.2.8-1ubuntu0.10_all.deb
Size/MD5: 72560 abbc80191e059fce87c599f947b3b402
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-src_2.2.8-1ubuntu0.10_all.deb
Size/MD5: 6256206 e50391cd977f7df987c13e17bb163f8f
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.10_all.deb
Size/MD5: 45482 a40b40465c3f99f1dd15f8bc85d24b23
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.10_amd64.deb
Size/MD5: 252722 95177119382131308fb3dcf98507a15c
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.10_amd64.deb
Size/MD5: 248352 20792be8ccf5b73e46ec4ca3f8c0726b
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.10_amd64.deb
Size/MD5: 252114 3a45c61b120d53327f52b101da77fe8f
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.10_amd64.deb
Size/MD5: 205226 1cdb16ee59e67550d536fc1ca2bf7576
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.10_amd64.deb
Size/MD5: 205994 93adabf4102d299fb420a764a8cbfe33
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.10_amd64.deb
Size/MD5: 141320 11fbd8d338da9da4fb2cfa47411e23b4
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.10_amd64.deb
Size/MD5: 803332 f31a349c870550a044ac939c4876ead3
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.10_i386.deb
Size/MD5: 235638 840b0a0bd4399a9799da6f42df7ccbb4
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.10_i386.deb
Size/MD5: 231238 6a4d251375dc0f811f427ed3377ac0ab
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.10_i386.deb
Size/MD5: 234880 354e2a88b0dbc19a10a5294879a507b1
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.10_i386.deb
Size/MD5: 205234 21900ec04423fb920197870e470b9aa7
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.10_i386.deb
Size/MD5: 206016 8796b13fb273f61c6c7c4bfb9adbe6aa
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.10_i386.deb
Size/MD5: 140294 ea6f40b6c12c27851a9f4f1e88aed544
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.10_i386.deb
Size/MD5: 754978 2ba7c3f44c9a5ed197c932232dad4808
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.10_lpia.deb
Size/MD5: 235176 6248fed01caabbfb4d70d0c13c7f17f5
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.10_lpia.deb
Size/MD5: 230866 95f247897f3bd77ea304dfd6c9dfd85c
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.10_lpia.deb
Size/MD5: 234344 987ff978cbacde11bc7353702973d125
http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.10_lpia.deb
Size/MD5: 205230 d7576f846491b2833c50f39cc1b0dc75
http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.10_lpia.deb
Size/MD5: 206002 0e1b63983e424122ed1d39826d76335c
http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.10_lpia.deb
Size/MD5: 140878 ce996c6cb3ec3552302869ae2256b20e
http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.10_lpia.deb
Size/MD5: 749176 d26c165846c36706ed1d7590a8be3f7b
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.10_powerpc.deb
Size/MD5: 253754 33add2865e4cd1c43a43895870454361
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.10_powerpc.deb
Size/MD5: 249222 538a952111c80146dd1887b556f7116b
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.10_powerpc.deb
Size/MD5: 253320 ad19124a89163a1f1d2212a3ac67a3fc
http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.10_powerpc.deb
Size/MD5: 205240 46728c8422948938f06a02677c2a5c77
http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.10_powerpc.deb
Size/MD5: 206016 05d6ac042561eb4ea302c90540c64528
http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.10_powerpc.deb
Size/MD5: 158034 051b060ed2dd44f5271401e4acc2b9b4
http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.10_powerpc.deb
Size/MD5: 905448 a839a4301bca447e91e58174aebad9be
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.10_sparc.deb
Size/MD5: 237026 7f91acb658058ba572cfc7d223e9968c
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.10_sparc.deb
Size/MD5: 232794 8af73b6967e695bfcbb900bf0423a366
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.10_sparc.deb
Size/MD5: 236262 ca2efbd5beef24f97cc4e94f0d45e511
http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.10_sparc.deb
Size/MD5: 205236 11ce3c413997a7203a2b1ddf2c7b608c
http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.10_sparc.deb
Size/MD5: 206016 0b11cbb82ae743d2300a5da249af99a7
http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.10_sparc.deb
Size/MD5: 143500 00c0a815768281a1939510ecf16615bc
http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.10_sparc.deb
Size/MD5: 764418 f1356117d9a2825fc87cb91344704e03
Updated packages for Ubuntu 8.10:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9-7ubuntu3.2.diff.gz
Size/MD5: 132027 05239552b7a95f91eef1d7606ef280c4
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9-7ubuntu3.2.dsc
Size/MD5: 1788 423154f094b3f5629e698638d9505a01
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9.orig.tar.gz
Size/MD5: 6396996 80d3754fc278338033296f0d41ef2c04
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.9-7ubuntu3.2_all.deb
Size/MD5: 2041678 859eb46d09d45f53599d9d0a71f2fa89
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-src_2.2.9-7ubuntu3.2_all.deb
Size/MD5: 6536854 e3572b1d683e4ee6967779dd07b637fd
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9-7ubuntu3.2_all.deb
Size/MD5: 45150 0ff7bf10b5bef6cf7258e6223f78736d
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.2_amd64.deb
Size/MD5: 254642 9f3bb3444753ace1ca55651c68924739
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.2_amd64.deb
Size/MD5: 248846 00267b5ab16a55aed008578fbdb24bed
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.2_amd64.deb
Size/MD5: 254018 81085b6d61faeb846e94b1a3bf8eb6a2
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.2_amd64.deb
Size/MD5: 208170 8e360619ff15112e636aaedc0340f1ee
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.2_amd64.deb
Size/MD5: 84142 3eaf3d803d582d3eb6fb29a79251df69
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.2_amd64.deb
Size/MD5: 82494 8f293a595f34d6710adb931d5dbcaf0f
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.2_amd64.deb
Size/MD5: 209220 73d2d91d313b951f643bf413467c4e5a
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.2_amd64.deb
Size/MD5: 147398 8a772d1dfdb49bae605bd7dee3f9f436
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.2_amd64.deb
Size/MD5: 819864 42aeca74c2ee5d0f5a5a4e10037ece11
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.2_i386.deb
Size/MD5: 240962 6427fbd76596cbe52029e6ed5a7da703
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.2_i386.deb
Size/MD5: 235678 5155e38f8137c85b9c229b4eafa144e3
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.2_i386.deb
Size/MD5: 240298 9f4f26b4d98d8707e15b6b7d02430e5e
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.2_i386.deb
Size/MD5: 208190 f68c7d60a09d53af6a8c8640b05e4ad9
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.2_i386.deb
Size/MD5: 83572 dd5d339c3e3af404aa3ffd0904ec6c7c
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.2_i386.deb
Size/MD5: 81968 7c7775dc8c89c4f7aec5f8c8a5f26e60
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.2_i386.deb
Size/MD5: 209236 079855f2fdc6843758bcad41421a46ea
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.2_i386.deb
Size/MD5: 146240 0b7ff0f038c7c40d84a1f342a1bbefca
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.2_i386.deb
Size/MD5: 778084 226ed90dc2ba09af3a38dcc40b38d834
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.2_lpia.deb
Size/MD5: 237982 7c7a5daf494862704d28d5c85d6c31cc
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.2_lpia.deb
Size/MD5: 232612 96ea385cf513d314d8e84a4c442cc234
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.2_lpia.deb
Size/MD5: 237230 4003bab7bbb427b1e9ec0e6d97c3e69b
http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.2_lpia.deb
Size/MD5: 208176 af28e327890eaddff4108231268eee6e
http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.2_lpia.deb
Size/MD5: 83530 4725b6872ac3ac9ad1ae62ba03592964
http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.2_lpia.deb
Size/MD5: 81950 adf39a429f5c04b6a5976c0b5ff30cd4
http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.2_lpia.deb
Size/MD5: 209232 477e0f43b36e9961c13b6c0fab7a0dc1
http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.2_lpia.deb
Size/MD5: 145928 6089cb1b3efa73128a00a237165076ea
http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.2_lpia.deb
Size/MD5: 766230 f876845ac3aae12ef2e0f36996531ef0
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.2_powerpc.deb
Size/MD5: 261150 afc86ac304cdc5af1550d346a8f8a3f9
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.2_powerpc.deb
Size/MD5: 255750 b301c6b3f3b4ae21e5ef5cb7ffb56683
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.2_powerpc.deb
Size/MD5: 260470 4c333c87af3a087faeec0da6a282295b
http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.2_powerpc.deb
Size/MD5: 208184 94332d103f410b07c99d2f849e108ec6
http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.2_powerpc.deb
Size/MD5: 84210 edb9eb638c12753a58a5d582ecaa60fa
http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.2_powerpc.deb
Size/MD5: 82556 356606fd10fe199eda49ba3258de85e4
http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.2_powerpc.deb
Size/MD5: 209232 0691c4dd34cb05a93799caa9929104d4
http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.2_powerpc.deb
Size/MD5: 160676 43a1b64573dd41946dec05b7afeeccf8
http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.2_powerpc.deb
Size/MD5: 925826 7a95a689bc4e8a0462e9d8e43ac88f5d
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.2_sparc.deb
Size/MD5: 246372 db9d10ebc566f9f50210670fc8882819
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.2_sparc.deb
Size/MD5: 240922 2b5b20a703e7f5d8fbc50fb1ee0b40f4
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.2_sparc.deb
Size/MD5: 245692 76832085d1b4ffd02948c9ac7b92b54e
http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.2_sparc.deb
Size/MD5: 208196 f6355dfafe95b8915593d514d6ec4cdc
http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.2_sparc.deb
Size/MD5: 83754 2aa37c091a042bd92eea616af4eaa13d
http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.2_sparc.deb
Size/MD5: 82126 dae25ab8ca9612b725ea89fb22cee433
http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.2_sparc.deb
Size/MD5: 209240 a93acaff6c5151aeddbbdeb335a1c8da
http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.2_sparc.deb
Size/MD5: 150576 43675606769e8ea6cbc172bbdf31ea09
http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.2_sparc.deb
Size/MD5: 783584 323183add2eaf6e1360c9eefcf0d5f8a
Updated packages for Ubuntu 9.04:
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.2.diff.gz
Size/MD5: 135188 d64295fbf395fedc32558e37c89dd582
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.2.dsc
Size/MD5: 1795 45bf7dad8a81012c187e219c6c863c9d
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11.orig.tar.gz
Size/MD5: 6806786 03e0a99a5de0f3f568a0087fb9993af9
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.11-2ubuntu2.2_all.deb
Size/MD5: 2218918 e157363876dbb978176c6ba59dc01d61
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.2_all.deb
Size/MD5: 46278 58851aa10579254cdb4d9f89e8b597c5
http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-src_2.2.11-2ubuntu2.2_all.deb
Size/MD5: 6946286 067a7635b8627b031b9eb9cf0cc847bf
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.2_amd64.deb
Size/MD5: 258646 7446874f9db13dea5da20f225024f477
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.2_amd64.deb
Size/MD5: 252848 823147209be87ff9322c276a8e2beace
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.2_amd64.deb
Size/MD5: 258024 6bfdbf469c0b0ba45e543bf7688ac5ee
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.2_amd64.deb
Size/MD5: 212932 aeeb0ccb1f8e72a15aaf08450a056c1c
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.2_amd64.deb
Size/MD5: 213906 8621b4d1d85ab19f154a86ec465fa316
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.2_amd64.deb
Size/MD5: 150776 f7def056c536f9b1a329a3b6fef43b7f
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.2_amd64.deb
Size/MD5: 826672 e18163156730829c91161191ee00b340
http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.2_amd64.deb
Size/MD5: 87442 39f0e4aaf42e4bb049da17f26a0d9c25
http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.2_amd64.deb
Size/MD5: 85730 a11a39f7102937e5d00b03190ff42a60
i386 architecture (x86 compatible Intel/AMD):
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.2_i386.deb
Size/MD5: 245132 c7202ff8f066903e207ebff93557644a
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.2_i386.deb
Size/MD5: 239670 18279b3faf8344f9e7f903862114c998
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.2_i386.deb
Size/MD5: 244518 c24b66a4a61c2af8edf32b10867cf958
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.2_i386.deb
Size/MD5: 212922 a009d9ba9486ba53a3441ca2a48bc9d8
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.2_i386.deb
Size/MD5: 213898 6e26de281d137dfab7dbc700ca1f7eb5
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.2_i386.deb
Size/MD5: 149678 d4499d622b98d7a9ed3a1b700f954e95
http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.2_i386.deb
Size/MD5: 783924 45fbb8ab4bfa3297b0e04231677f86a1
http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.2_i386.deb
Size/MD5: 86818 9d01aae1849d4ccc93c64e7640912b64
http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.2_i386.deb
Size/MD5: 85222 0a3f70a6697f945a1acec0629edd8586
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.2_lpia.deb
Size/MD5: 242014 0b9676d42353eae308b923ac2c2172d7
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.2_lpia.deb
Size/MD5: 236570 d42595dd3d5229a7db2f4a6b3047a372
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.2_lpia.deb
Size/MD5: 241440 3cfa67183c677cc44fc9f0354231978b
http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.2_lpia.deb
Size/MD5: 212924 83433f6847c191927c8bb5234339416a
http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.2_lpia.deb
Size/MD5: 213902 4be2d9e80eabaea30169e3fa39ebe3d8
http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.2_lpia.deb
Size/MD5: 149396 20350717c1cebdf372f0d11d09374852
http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.2_lpia.deb
Size/MD5: 773130 cbed31d2962a5e0c77a400434f9b7ff4
http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.2_lpia.deb
Size/MD5: 86764 6a9b7a0a9015044fff19ff9bf479fbc3
http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.2_lpia.deb
Size/MD5: 85188 2d685381871858d3c685da5a2b44f0f7
powerpc architecture (Apple Macintosh G3/G4/G5):
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.2_powerpc.deb
Size/MD5: 265094 41f064e2daa4ddaf422bcd5013163c11
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.2_powerpc.deb
Size/MD5: 260042 f60b2311f40da9c254fc7583a6a4215a
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.2_powerpc.deb
Size/MD5: 264720 80ba36d44ae08be1f5593b9d60c873e9
http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.2_powerpc.deb
Size/MD5: 212934 a35fed013193cf2d0c021baaac793a13
http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.2_powerpc.deb
Size/MD5: 213912 d6f400db5f98bb345b063b5a191735fc
http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.2_powerpc.deb
Size/MD5: 164086 36c7ab8da76606f2a1fa12328cd35123
http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.2_powerpc.deb
Size/MD5: 932026 9a66083f7211f75a083c20a94efebf12
http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.2_powerpc.deb
Size/MD5: 87516 8a913c9fd0b3f6e7c71cfb6ce6345702
http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.2_powerpc.deb
Size/MD5: 85794 c74337f58c4bad32e2ca1349a182696a
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.2_sparc.deb
Size/MD5: 250414 dd2f00b98a1089c03950010ee4feacdc
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.2_sparc.deb
Size/MD5: 244704 9748c6a30dd03d7a94b7ee0e5cbbf37c
http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.2_sparc.deb
Size/MD5: 249756 68a0607bb1d915a1da034f3ecda6e492
http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.2_sparc.deb
Size/MD5: 212924 03ceb43c9e4494db9ce8e2375edadd5b
http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.2_sparc.deb
Size/MD5: 213900 c17c6bdc630a6229922c969f94988c32
http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.2_sparc.deb
Size/MD5: 153928 0109fff49b9f806f9de07f2fbac15945
http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.2_sparc.deb
Size/MD5: 788928 11998be7f1d0a6f1952646df23936645
http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.2_sparc.deb
Size/MD5: 87010 a87263816f682082b234a7b3421b3729
http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.2_sparc.deb
Size/MD5: 85318 a17451cf2fa5597b4bb6abb2145f2a55
Show details on source website
{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.3,
"vendor": "debian",
"version": "5.0"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.3"
},
{
"_id": null,
"model": "fedora",
"scope": "eq",
"trust": 1.0,
"vendor": "fedoraproject",
"version": "11"
},
{
"_id": null,
"model": "http server",
"scope": "gte",
"trust": 1.0,
"vendor": "apache",
"version": "2.2.0"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "6.0"
},
{
"_id": null,
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "8.10"
},
{
"_id": null,
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "9.04"
},
{
"_id": null,
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.0"
},
{
"_id": null,
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "6.06"
},
{
"_id": null,
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "8.04"
},
{
"_id": null,
"model": "http server",
"scope": "gte",
"trust": 1.0,
"vendor": "apache",
"version": "2.0.35"
},
{
"_id": null,
"model": "enterprise linux server",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.0"
},
{
"_id": null,
"model": "enterprise linux workstation",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.0"
},
{
"_id": null,
"model": "http server",
"scope": "lt",
"trust": 1.0,
"vendor": "apache",
"version": "2.0.64"
},
{
"_id": null,
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.3"
},
{
"_id": null,
"model": "http server",
"scope": "lt",
"trust": 1.0,
"vendor": "apache",
"version": "2.2.12"
},
{
"_id": null,
"model": "http server",
"scope": "lte",
"trust": 0.8,
"vendor": "apache",
"version": "2.2.11"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "2.0.47.x"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "6.0.2"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "6.1"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "7.0"
},
{
"_id": null,
"model": "websphere application server",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "6.0.2"
},
{
"_id": null,
"model": "websphere application server",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "6.1"
},
{
"_id": null,
"model": "websphere application server",
"scope": "eq",
"trust": 0.8,
"vendor": "ibm",
"version": "7.0"
},
{
"_id": null,
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.5.8"
},
{
"_id": null,
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.6"
},
{
"_id": null,
"model": "mac os x",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.6.1"
},
{
"_id": null,
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.5.8"
},
{
"_id": null,
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.6"
},
{
"_id": null,
"model": "mac os x server",
"scope": "eq",
"trust": 0.8,
"vendor": "apple",
"version": "v10.6.1"
},
{
"_id": null,
"model": "opensolaris",
"scope": null,
"trust": 0.8,
"vendor": "oracle",
"version": null
},
{
"_id": null,
"model": "solaris",
"scope": "eq",
"trust": 0.8,
"vendor": "oracle",
"version": "10"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3 (x86)"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3 (x86-64)"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3.0"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "3.0 (x86-64)"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "4.0"
},
{
"_id": null,
"model": "asianux server",
"scope": "eq",
"trust": 0.8,
"vendor": "cybertrust",
"version": "4.0 (x86-64)"
},
{
"_id": null,
"model": "turbolinux appliance server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "2.0"
},
{
"_id": null,
"model": "turbolinux appliance server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "3.0"
},
{
"_id": null,
"model": "turbolinux appliance server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "3.0 (x64)"
},
{
"_id": null,
"model": "turbolinux client",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "2008"
},
{
"_id": null,
"model": "turbolinux fuji",
"scope": null,
"trust": 0.8,
"vendor": "turbo linux",
"version": null
},
{
"_id": null,
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "10"
},
{
"_id": null,
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "10 (x64)"
},
{
"_id": null,
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "11"
},
{
"_id": null,
"model": "turbolinux server",
"scope": "eq",
"trust": 0.8,
"vendor": "turbo linux",
"version": "11 (x64)"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.11"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.23"
},
{
"_id": null,
"model": "hp-ux",
"scope": "eq",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "11.31"
},
{
"_id": null,
"model": "hp-ux apache-based web server",
"scope": "lt",
"trust": 0.8,
"vendor": "hewlett packard",
"version": "v.2.2.15.03"
},
{
"_id": null,
"model": "application stack",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "v2"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (as)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (es)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3 (ws)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (as)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (es)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4 (ws)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4.8 (as)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4.8 (es)"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5 (server)"
},
{
"_id": null,
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "3.0"
},
{
"_id": null,
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "4.0"
},
{
"_id": null,
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5.0 (client)"
},
{
"_id": null,
"model": "enterprise linux eus",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5.3.z (server)"
},
{
"_id": null,
"model": "rhel desktop workstation",
"scope": "eq",
"trust": 0.8,
"vendor": "red hat",
"version": "5 (client)"
},
{
"_id": null,
"model": "interstage application server",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"_id": null,
"model": "interstage studio",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"_id": null,
"model": "interstage web server",
"scope": null,
"trust": 0.8,
"vendor": "fujitsu",
"version": null
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "2.2.0"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "2.1.9"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "2.1.8"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "2.2.9"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "2.2.10"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "2.1.7"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "2.1.6"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "2.2.1"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "2.2"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.6,
"vendor": "apache",
"version": "2.2.8"
},
{
"_id": null,
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "9.04"
},
{
"_id": null,
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "9.04"
},
{
"_id": null,
"model": "linux lpia",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "9.04"
},
{
"_id": null,
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "9.04"
},
{
"_id": null,
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "9.04"
},
{
"_id": null,
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.10"
},
{
"_id": null,
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.10"
},
{
"_id": null,
"model": "linux lpia",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.10"
},
{
"_id": null,
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.10"
},
{
"_id": null,
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.10"
},
{
"_id": null,
"model": "linux lts sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"_id": null,
"model": "linux lts powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"_id": null,
"model": "linux lts lpia",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"_id": null,
"model": "linux lts i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"_id": null,
"model": "linux lts amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "8.04"
},
{
"_id": null,
"model": "linux lts sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"_id": null,
"model": "linux lts powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"_id": null,
"model": "linux lts i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"_id": null,
"model": "linux lts amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "6.06"
},
{
"_id": null,
"model": "server",
"scope": "eq",
"trust": 0.3,
"vendor": "turbolinux",
"version": "10.0"
},
{
"_id": null,
"model": "server",
"scope": "eq",
"trust": 0.3,
"vendor": "turbolinux",
"version": "11x64"
},
{
"_id": null,
"model": "server",
"scope": "eq",
"trust": 0.3,
"vendor": "turbolinux",
"version": "11"
},
{
"_id": null,
"model": "server",
"scope": "eq",
"trust": 0.3,
"vendor": "turbolinux",
"version": "10.0.0x64"
},
{
"_id": null,
"model": "fuji",
"scope": null,
"trust": 0.3,
"vendor": "turbolinux",
"version": null
},
{
"_id": null,
"model": "fuji",
"scope": "eq",
"trust": 0.3,
"vendor": "turbolinux",
"version": "0"
},
{
"_id": null,
"model": "client",
"scope": "eq",
"trust": 0.3,
"vendor": "turbolinux",
"version": "2008"
},
{
"_id": null,
"model": "appliance server",
"scope": "eq",
"trust": 0.3,
"vendor": "turbolinux",
"version": "3.0x64"
},
{
"_id": null,
"model": "appliance server",
"scope": "eq",
"trust": 0.3,
"vendor": "turbolinux",
"version": "3.0"
},
{
"_id": null,
"model": "appliance server",
"scope": "eq",
"trust": 0.3,
"vendor": "turbolinux",
"version": "2.0"
},
{
"_id": null,
"model": "linux enterprise server",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "9"
},
{
"_id": null,
"model": "linux enterprise server debuginfo",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "11"
},
{
"_id": null,
"model": "linux enterprise server",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "11"
},
{
"_id": null,
"model": "linux enterprise server sp3",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"_id": null,
"model": "linux enterprise server sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"_id": null,
"model": "linux enterprise sdk sp3",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"_id": null,
"model": "linux enterprise sdk sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"_id": null,
"model": "linux enterprise desktop sp3",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"_id": null,
"model": "linux enterprise desktop sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"_id": null,
"model": "linux enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "11"
},
{
"_id": null,
"model": "linux enterprise sp3 debuginfo",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"_id": null,
"model": "linux enterprise sp2 debuginfo",
"scope": "eq",
"trust": 0.3,
"vendor": "suse",
"version": "10"
},
{
"_id": null,
"model": "solaris 10 x86",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "solaris 10 sparc",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 99",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 98",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 96",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 95",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 94",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 93",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 92",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 91",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 90",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 89",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 88",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 87",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 86",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 85",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 84",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 83",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 82",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 81",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 80",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 78",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 77",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 76",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 74",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 71",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 68",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 67",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 64",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 61",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 59",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 58",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 57",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 56",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 54",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 51",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 50",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 49",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 48",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 47",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 45",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 41",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 39",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 38",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 37",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 36",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 35",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 29",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 28",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 22",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 19",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 13",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 111a",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 111",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 110",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 109",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 108",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 107",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 106",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 105",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 104",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 103",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 102",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 101a",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 101",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 100",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 02",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 01",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris build snv 111b",
"scope": null,
"trust": 0.3,
"vendor": "sun",
"version": null
},
{
"_id": null,
"model": "opensolaris",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "0"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "12.2"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "12.1"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "12.0"
},
{
"_id": null,
"model": "linux -current",
"scope": null,
"trust": 0.3,
"vendor": "slackware",
"version": null
},
{
"_id": null,
"model": "opensuse",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "11.1"
},
{
"_id": null,
"model": "opensuse",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "11.0"
},
{
"_id": null,
"model": "opensuse",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "10.3"
},
{
"_id": null,
"model": "open-enterprise-server",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "0"
},
{
"_id": null,
"model": "novell linux pos",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9"
},
{
"_id": null,
"model": "novell linux desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "s u s e",
"version": "9.0"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "rpath",
"version": "2"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "rpath",
"version": "1"
},
{
"_id": null,
"model": "appliance platform linux service",
"scope": "eq",
"trust": 0.3,
"vendor": "rpath",
"version": "2"
},
{
"_id": null,
"model": "appliance platform linux service",
"scope": "eq",
"trust": 0.3,
"vendor": "rpath",
"version": "1"
},
{
"_id": null,
"model": "jboss enterprise web server el4",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "0"
},
{
"_id": null,
"model": "jboss enterprise web server",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "5.0"
},
{
"_id": null,
"model": "enterprise linux ws",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"_id": null,
"model": "enterprise linux ws",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3"
},
{
"_id": null,
"model": "enterprise linux es",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"_id": null,
"model": "enterprise linux es",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3"
},
{
"_id": null,
"model": "enterprise linux as",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"_id": null,
"model": "enterprise linux as",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3"
},
{
"_id": null,
"model": "enterprise linux desktop version",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "4"
},
{
"_id": null,
"model": "desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "3.0"
},
{
"_id": null,
"model": "certificate server",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "7.3"
},
{
"_id": null,
"model": "application stack",
"scope": "eq",
"trust": 0.3,
"vendor": "redhat",
"version": "v20"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "pardus",
"version": "20090"
},
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "pardus",
"version": "20080"
},
{
"_id": null,
"model": "linux mandrake x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2008.0"
},
{
"_id": null,
"model": "linux mandrake",
"scope": "eq",
"trust": 0.3,
"vendor": "mandriva",
"version": "2008.0"
},
{
"_id": null,
"model": "enterprise server x86 64",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "5"
},
{
"_id": null,
"model": "enterprise server",
"scope": "eq",
"trust": 0.3,
"vendor": "mandrakesoft",
"version": "5"
},
{
"_id": null,
"model": "websphere application server",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "6.0.1"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "2.0.47.1"
},
{
"_id": null,
"model": "http server",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "2.0.47"
},
{
"_id": null,
"model": "openvms secure web server",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "1.2"
},
{
"_id": null,
"model": "openvms secure web server",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "1.1-1"
},
{
"_id": null,
"model": "openvms secure web server",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "2.1-1"
},
{
"_id": null,
"model": "hp-ux b.11.31",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"_id": null,
"model": "hp-ux b.11.23",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"_id": null,
"model": "hp-ux b.11.11",
"scope": null,
"trust": 0.3,
"vendor": "hp",
"version": null
},
{
"_id": null,
"model": "linux",
"scope": null,
"trust": 0.3,
"vendor": "gentoo",
"version": null
},
{
"_id": null,
"model": "interstage studio enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "fujitsu",
"version": "9.2"
},
{
"_id": null,
"model": "interstage studio enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "fujitsu",
"version": "9.1"
},
{
"_id": null,
"model": "interstage studio enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "fujitsu",
"version": "9.0"
},
{
"_id": null,
"model": "interstage studio enterprise edition b",
"scope": "eq",
"trust": 0.3,
"vendor": "fujitsu",
"version": "9.1.0"
},
{
"_id": null,
"model": "interstage application server standard-j edition",
"scope": "eq",
"trust": 0.3,
"vendor": "fujitsu",
"version": "9.3.1"
},
{
"_id": null,
"model": "interstage application server standard-j edition",
"scope": "eq",
"trust": 0.3,
"vendor": "fujitsu",
"version": "9.2"
},
{
"_id": null,
"model": "interstage application server standard-j edition",
"scope": "eq",
"trust": 0.3,
"vendor": "fujitsu",
"version": "9.1"
},
{
"_id": null,
"model": "interstage application server standard-j edition b",
"scope": "eq",
"trust": 0.3,
"vendor": "fujitsu",
"version": "9.0"
},
{
"_id": null,
"model": "interstage application server standard-j edition a",
"scope": "eq",
"trust": 0.3,
"vendor": "fujitsu",
"version": "9.0"
},
{
"_id": null,
"model": "interstage application server standard-j edition 9.1.0b",
"scope": null,
"trust": 0.3,
"vendor": "fujitsu",
"version": null
},
{
"_id": null,
"model": "interstage application server enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "fujitsu",
"version": "9.2"
},
{
"_id": null,
"model": "interstage application server enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "fujitsu",
"version": "9.1"
},
{
"_id": null,
"model": "interstage application server enterprise edition a",
"scope": "eq",
"trust": 0.3,
"vendor": "fujitsu",
"version": "9.0"
},
{
"_id": null,
"model": "interstage application server enterprise edition",
"scope": "eq",
"trust": 0.3,
"vendor": "fujitsu",
"version": "9.0"
},
{
"_id": null,
"model": "interstage application server enterprise edition 9.1.0b",
"scope": null,
"trust": 0.3,
"vendor": "fujitsu",
"version": null
},
{
"_id": null,
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"_id": null,
"model": "linux s/390",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"_id": null,
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"_id": null,
"model": "linux mipsel",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"_id": null,
"model": "linux mips",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"_id": null,
"model": "linux m68k",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"_id": null,
"model": "linux ia-64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"_id": null,
"model": "linux ia-32",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"_id": null,
"model": "linux hppa",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"_id": null,
"model": "linux armel",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"_id": null,
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"_id": null,
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"_id": null,
"model": "linux alpha",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "5.0"
},
{
"_id": null,
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux s/390",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux mipsel",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux mips",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux m68k",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux ia-64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux ia-32",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux hppa",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux armel",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "linux alpha",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "4.0"
},
{
"_id": null,
"model": "coat systems director",
"scope": "eq",
"trust": 0.3,
"vendor": "blue",
"version": "5.2.2.5"
},
{
"_id": null,
"model": "coat systems director",
"scope": "eq",
"trust": 0.3,
"vendor": "blue",
"version": "4.2.2.4"
},
{
"_id": null,
"model": "coat systems director",
"scope": "eq",
"trust": 0.3,
"vendor": "blue",
"version": "5.5"
},
{
"_id": null,
"model": "coat systems director",
"scope": "eq",
"trust": 0.3,
"vendor": "blue",
"version": "5.4"
},
{
"_id": null,
"model": "coat systems director",
"scope": "eq",
"trust": 0.3,
"vendor": "blue",
"version": "0"
},
{
"_id": null,
"model": "voice portal",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.1"
},
{
"_id": null,
"model": "voice portal",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.0"
},
{
"_id": null,
"model": "messaging storage server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.0"
},
{
"_id": null,
"model": "messaging storage server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.0"
},
{
"_id": null,
"model": "message networking",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"_id": null,
"model": "message networking",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.1"
},
{
"_id": null,
"model": "meeting exchange",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"_id": null,
"model": "meeting exchange sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.1"
},
{
"_id": null,
"model": "meeting exchange",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.1"
},
{
"_id": null,
"model": "meeting exchange sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.0"
},
{
"_id": null,
"model": "meeting exchange sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.0"
},
{
"_id": null,
"model": "meeting exchange",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.0"
},
{
"_id": null,
"model": "aura sip enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2.1"
},
{
"_id": null,
"model": "aura sip enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "3.1"
},
{
"_id": null,
"model": "aura sip enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"_id": null,
"model": "aura sip enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.1"
},
{
"_id": null,
"model": "aura sip enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.0"
},
{
"_id": null,
"model": "aura communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"_id": null,
"model": "aura communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.1"
},
{
"_id": null,
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.2.2"
},
{
"_id": null,
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.2"
},
{
"_id": null,
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.0"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.1"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.8"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.7"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.6"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.5"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.4"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.3"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.2"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.1"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.11"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.10"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.9"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.8"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.7"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.6"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.5"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.4"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.3"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.2"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.1"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.9"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.8"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.7"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.6"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.5"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.4"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.3"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.2"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.1"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6"
},
{
"_id": null,
"model": "mac os server",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.1"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.8"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.7"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.6"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.5"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.4"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.3"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.2"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.1"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.11"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.10"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.9"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.8"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.7"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.6"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.5"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.4"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.3"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.2"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.1"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.9"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.8"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.7"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.6"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.5"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.4"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.3"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.2"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.1"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6"
},
{
"_id": null,
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5"
},
{
"_id": null,
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.11"
},
{
"_id": null,
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.10"
},
{
"_id": null,
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.9"
},
{
"_id": null,
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.8"
},
{
"_id": null,
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.6"
},
{
"_id": null,
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.5"
},
{
"_id": null,
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.4"
},
{
"_id": null,
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.3"
},
{
"_id": null,
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.2"
},
{
"_id": null,
"model": "2.2.7-dev",
"scope": null,
"trust": 0.3,
"vendor": "apache",
"version": null
},
{
"_id": null,
"model": "2.2.6-dev",
"scope": null,
"trust": 0.3,
"vendor": "apache",
"version": null
},
{
"_id": null,
"model": "2.2.5-dev",
"scope": null,
"trust": 0.3,
"vendor": "apache",
"version": null
},
{
"_id": null,
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2.1"
},
{
"_id": null,
"model": "apache",
"scope": "eq",
"trust": 0.3,
"vendor": "apache",
"version": "2.2"
},
{
"_id": null,
"model": "openvms secure web server",
"scope": "ne",
"trust": 0.3,
"vendor": "hp",
"version": "2.2"
},
{
"_id": null,
"model": "coat systems director",
"scope": "ne",
"trust": 0.3,
"vendor": "blue",
"version": "5.5.2.3"
},
{
"_id": null,
"model": "mac os server",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.2"
},
{
"_id": null,
"model": "mac os",
"scope": "ne",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.2"
}
],
"sources": [
{
"db": "BID",
"id": "35623"
},
{
"db": "CNNVD",
"id": "CNNVD-200907-157"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001892"
},
{
"db": "NVD",
"id": "CVE-2009-1891"
}
]
},
"configurations": {
"_id": null,
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:apache:http_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:ibm:http_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:ibm:websphere_application_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:mac_os_x",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:apple:mac_os_x_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:oracle:opensolaris",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:oracle:solaris",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:turbolinux:turbolinux_appliance_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:turbolinux:turbolinux_client",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:turbolinux:turbolinux_fuji",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:turbolinux:turbolinux_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:hp:hp-ux",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/h:hp:apache-based_web_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:redhat:rhel_application_stack",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux_desktop",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:enterprise_linux_eus",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:redhat:rhel_desktop_workstation",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:fujitsu:interstage_application_server",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:fujitsu:interstage_studio",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/a:fujitsu:interstage_web_server",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-001892"
}
]
},
"credits": {
"_id": null,
"data": "Joe Orton",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200907-157"
}
],
"trust": 0.6
},
"cve": "CVE-2009-1891",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2009-1891",
"impactScore": 6.9,
"integrityImpact": "NONE",
"severity": "HIGH",
"trust": 1.1,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 4.3,
"confidentialityImpact": "None",
"exploitabilityScore": null,
"id": "CVE-2009-1891",
"impactScore": null,
"integrityImpact": "None",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2009-1891",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2009-1891",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-200907-157",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2009-1891",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2009-1891"
},
{
"db": "CNNVD",
"id": "CNNVD-200907-157"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001892"
},
{
"db": "NVD",
"id": "CVE-2009-1891"
}
]
},
"description": {
"_id": null,
"data": "The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption). (DoS) There is a vulnerability that becomes a condition.Service operation disruption to a third party (DoS) There is a possibility of being put into a state. The Apache \u0027mod_deflate\u0027 module is prone to a denial-of-service vulnerability. \nSuccessful exploits may allow remote attackers to cause denial-of-service conditions and prevent legitimate users from accessing the services. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n _______________________________________________________________________\n\n Mandriva Linux Security Advisory MDVSA-2009:323\n http://www.mandriva.com/security/\n _______________________________________________________________________\n\n Package : apache\n Date : December 7, 2009\n Affected: 2008.0\n _______________________________________________________________________\n\n Problem Description:\n\n Multiple vulnerabilities has been found and corrected in apache:\n \n Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c\n in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to\n cause a denial of service (memory consumption) via multiple calls, as\n demonstrated by initial SSL client handshakes to the Apache HTTP Server\n mod_ssl that specify a compression algorithm (CVE-2008-1678). Note\n that this security issue does not really apply as zlib compression\n is not enabled in the openssl build provided by Mandriva, but apache\n is patched to address this issue anyway (conserns 2008.1 only). \n \n Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the\n mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c\n in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions,\n allows remote attackers to inject arbitrary web script or HTML via\n wildcards in a pathname in an FTP URI (CVE-2008-2939). Note that this\n security issue was initially addressed with MDVSA-2008:195 but the\n patch fixing the issue was added but not applied in 2009.0. \n \n The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not\n properly handle Options=IncludesNOEXEC in the AllowOverride directive,\n which allows local users to gain privileges by configuring (1) Options\n Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a\n .htaccess file, and then inserting an exec element in a .shtml file\n (CVE-2009-1195). \n \n Fix a potential Denial-of-Service attack against mod_deflate or other\n modules, by forcing the server to consume CPU time in compressing a\n large file after a client disconnects (CVE-2009-1891). \n \n The mod_proxy_ftp module in the Apache HTTP Server allows remote\n attackers to bypass intended access restrictions and send arbitrary\n commands to an FTP server via vectors related to the embedding of these\n commands in the Authorization HTTP header, as demonstrated by a certain\n module in VulnDisco Pack Professional 8.11. NOTE: as of 20090903,\n this disclosure has no actionable information. However, because the\n VulnDisco Pack author is a reliable researcher, the issue is being\n assigned a CVE identifier for tracking purposes (CVE-2009-3095). \n \n Apache is affected by SSL injection or man-in-the-middle attacks\n due to a design flaw in the SSL and/or TLS protocols. A short term\n solution was released Sat Nov 07 2009 by the ASF team to mitigate\n these problems. Apache will now reject in-session renegotiation\n (CVE-2009-3555). \n \n Packages for 2008.0 are being provided due to extended support for\n Corporate products. \n \n This update provides a solution to these vulnerabilities. \n _______________________________________________________________________\n\n References:\n\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1678\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1191\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555\n http://marc.info/?l=apache-httpd-announce\u0026m=125755783724966\u0026w=2\n _______________________________________________________________________\n\n Updated Packages:\n\n Mandriva Linux 2008.0:\n dd2bebdd6726d2d865331d37068a90b7 2008.0/i586/apache-base-2.2.6-8.3mdv2008.0.i586.rpm\n 6de9d36a91b125cc03bafe911b7a38a2 2008.0/i586/apache-devel-2.2.6-8.3mdv2008.0.i586.rpm\n ab7963efad1b7951c94a24075a2070e7 2008.0/i586/apache-htcacheclean-2.2.6-8.3mdv2008.0.i586.rpm\n 42a53b597d5547fb88b7427cacd617a1 2008.0/i586/apache-mod_authn_dbd-2.2.6-8.3mdv2008.0.i586.rpm\n 1dff9d313e93c94e907d8c72348ed2e0 2008.0/i586/apache-mod_cache-2.2.6-8.3mdv2008.0.i586.rpm\n b575ede2978ad47e41d355bd8b192725 2008.0/i586/apache-mod_dav-2.2.6-8.3mdv2008.0.i586.rpm\n 8ff3dee24d2d2d9a8d13e567cf1eaced 2008.0/i586/apache-mod_dbd-2.2.6-8.3mdv2008.0.i586.rpm\n 7bae541dfec14b21700878514750de83 2008.0/i586/apache-mod_deflate-2.2.6-8.3mdv2008.0.i586.rpm\n 19cab766a26ce53bd7e7973ed92f0db4 2008.0/i586/apache-mod_disk_cache-2.2.6-8.3mdv2008.0.i586.rpm\n a1336e4ab4f282c388d7565bde4557fd 2008.0/i586/apache-mod_file_cache-2.2.6-8.3mdv2008.0.i586.rpm\n 6b2f2eb949977349390fa3b06cf257e7 2008.0/i586/apache-mod_ldap-2.2.6-8.3mdv2008.0.i586.rpm\n 3640bbef5262ec0407126e31dd5ddde3 2008.0/i586/apache-mod_mem_cache-2.2.6-8.3mdv2008.0.i586.rpm\n 98793747365606baabc08f22e36a0a04 2008.0/i586/apache-mod_proxy-2.2.6-8.3mdv2008.0.i586.rpm\n d7fe4d88f25d2a01b0809ab5292b0999 2008.0/i586/apache-mod_proxy_ajp-2.2.6-8.3mdv2008.0.i586.rpm\n 4c9f48adbd0b1d45a874f06b9275ebe3 2008.0/i586/apache-mod_ssl-2.2.6-8.3mdv2008.0.i586.rpm\n e5a1d9476316ccc9f183cb1ae5bbcf31 2008.0/i586/apache-modules-2.2.6-8.3mdv2008.0.i586.rpm\n 44f7810695a40519c68930695829f124 2008.0/i586/apache-mod_userdir-2.2.6-8.3mdv2008.0.i586.rpm\n d6f666e9954422664d1f029fc147b591 2008.0/i586/apache-mpm-event-2.2.6-8.3mdv2008.0.i586.rpm\n 75e205ddbc9313b8d02519e57919923a 2008.0/i586/apache-mpm-itk-2.2.6-8.3mdv2008.0.i586.rpm\n 6d68e8fa7baccc2ad090c703fb33458e 2008.0/i586/apache-mpm-prefork-2.2.6-8.3mdv2008.0.i586.rpm\n 331f18ce48403472fc7f8af6d5daee8e 2008.0/i586/apache-mpm-worker-2.2.6-8.3mdv2008.0.i586.rpm\n c75e69bcabc104938cb9033e591d1de8 2008.0/i586/apache-source-2.2.6-8.3mdv2008.0.i586.rpm \n 23fcdf29e21b0146fb5646baca2fa63b 2008.0/SRPMS/apache-2.2.6-8.3mdv2008.0.src.rpm\n\n Mandriva Linux 2008.0/X86_64:\n 3d4afe3f8da8369d80b6c195e132c5c0 2008.0/x86_64/apache-base-2.2.6-8.3mdv2008.0.x86_64.rpm\n 37034ee7c7eb813de2a00a6945a10248 2008.0/x86_64/apache-devel-2.2.6-8.3mdv2008.0.x86_64.rpm\n ba296f9aa229a616a2c406d1a16912c3 2008.0/x86_64/apache-htcacheclean-2.2.6-8.3mdv2008.0.x86_64.rpm\n 77fa75d36e7a4bbe154c846e3271e7a3 2008.0/x86_64/apache-mod_authn_dbd-2.2.6-8.3mdv2008.0.x86_64.rpm\n ca29e2db08b29e319f2392b46ea4c3fe 2008.0/x86_64/apache-mod_cache-2.2.6-8.3mdv2008.0.x86_64.rpm\n 3fbf5a0276adaa2d887a92482d81313f 2008.0/x86_64/apache-mod_dav-2.2.6-8.3mdv2008.0.x86_64.rpm\n 9c66e471c2d2d3e43462302d0cc6f1c9 2008.0/x86_64/apache-mod_dbd-2.2.6-8.3mdv2008.0.x86_64.rpm\n 05020102a26a28b96319b23e3b6e43d6 2008.0/x86_64/apache-mod_deflate-2.2.6-8.3mdv2008.0.x86_64.rpm\n 7191542417b30ed77334f1b8366628aa 2008.0/x86_64/apache-mod_disk_cache-2.2.6-8.3mdv2008.0.x86_64.rpm\n f4177dbdcfd2e3dc8e66be731ad731c4 2008.0/x86_64/apache-mod_file_cache-2.2.6-8.3mdv2008.0.x86_64.rpm\n fea417664f0a2689fa12308bd80c2fe4 2008.0/x86_64/apache-mod_ldap-2.2.6-8.3mdv2008.0.x86_64.rpm\n 9cf956fa426e6bdf6497337b6e26a2ab 2008.0/x86_64/apache-mod_mem_cache-2.2.6-8.3mdv2008.0.x86_64.rpm\n 0d9d04ca878bb3f19f4764152da42d82 2008.0/x86_64/apache-mod_proxy-2.2.6-8.3mdv2008.0.x86_64.rpm\n dbbcd75dd83779f54f98fa3e16b59f13 2008.0/x86_64/apache-mod_proxy_ajp-2.2.6-8.3mdv2008.0.x86_64.rpm\n dce8db6742ba28a71e18b86bb38688c8 2008.0/x86_64/apache-mod_ssl-2.2.6-8.3mdv2008.0.x86_64.rpm\n 2ff69d6e9c2cd3250f6746d4a7d921fd 2008.0/x86_64/apache-modules-2.2.6-8.3mdv2008.0.x86_64.rpm\n f298827d4dfa631a77907f7f5733fa29 2008.0/x86_64/apache-mod_userdir-2.2.6-8.3mdv2008.0.x86_64.rpm\n 6f02fb080e308ca0826fdb1ef00a1489 2008.0/x86_64/apache-mpm-event-2.2.6-8.3mdv2008.0.x86_64.rpm\n b886d30d73c60a515b3ed36d7f186378 2008.0/x86_64/apache-mpm-itk-2.2.6-8.3mdv2008.0.x86_64.rpm\n 62d7754a5aa7af596cc06cd540d4025f 2008.0/x86_64/apache-mpm-prefork-2.2.6-8.3mdv2008.0.x86_64.rpm\n d3438e0967978e580be896bd85f1d953 2008.0/x86_64/apache-mpm-worker-2.2.6-8.3mdv2008.0.x86_64.rpm\n e72af335ec7c3c02b5a494fbd6e99e0e 2008.0/x86_64/apache-source-2.2.6-8.3mdv2008.0.x86_64.rpm \n 23fcdf29e21b0146fb5646baca2fa63b 2008.0/SRPMS/apache-2.2.6-8.3mdv2008.0.src.rpm\n _______________________________________________________________________\n\n To upgrade automatically use MandrivaUpdate or urpmi. The verification\n of md5 checksums and GPG signatures is performed automatically for you. \n\n All packages are signed by Mandriva for security. You can obtain the\n GPG public key of the Mandriva Security Team by executing:\n\n gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98\n\n You can view other update advisories for Mandriva Linux at:\n\n http://www.mandriva.com/security/advisories\n\n If you want to report vulnerabilities, please contact\n\n security_(at)_mandriva.com\n _______________________________________________________________________\n\n Type Bits/KeyID Date User ID\n pub 1024D/22458A98 2000-07-10 Mandriva Security Team\n \u003csecurity*mandriva.com\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.9 (GNU/Linux)\n\niD8DBQFLHQcamqjQ0CJFipgRAsJgAKDf5oc5UbEz3j+qsMn3tL6F8cujygCfY+cu\nMUj4lK2Wsb+qzbv2V+Ih30U=\n=VdZS\n-----END PGP SIGNATURE-----\n. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 www-servers/apache \u003c 2.2.11-r2 \u003e= 2.2.11-r2\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in the Apache HTTP\nserver:\n\n* Jonathan Peatfield reported that the \"Options=IncludesNoEXEC\"\n argument to the \"AllowOverride\" directive is not processed properly\n (CVE-2009-1195). \n\n* Sander de Boer discovered that the AJP proxy module (mod_proxy_ajp)\n does not correctly handle POST requests that do not contain a request\n body (CVE-2009-1191). \n\nImpact\n======\n\nA local attacker could circumvent restrictions put up by the server\nadministrator and execute arbitrary commands with the privileges of the\nuser running the Apache server. \n\nWorkaround\n==========\n\nRemove \"include\", \"mod_proxy_ajp\", \"mod_proxy_http\" and \"deflate\" from\nAPACHE2_MODULES in make.conf and rebuild Apache, or disable the\naforementioned modules in the Apache configuration. \n\nResolution\n==========\n\nAll Apache users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=www-servers/apache-2.2.11-r2\"\n\nReferences\n==========\n\n [ 1 ] CVE-2009-1195\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195\n [ 2 ] CVE-2009-1191\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1191\n [ 3 ] CVE-2009-1890\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890\n [ 4 ] CVE-2009-1891\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-200907-04.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttp://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2009 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c02824490\nVersion: 1\n\nHPSBOV02683 SSRT090208 rev.1 - HP Secure Web Server (SWS) for OpenVMS running Apache/PHP, Remote Denial of Service (DoS), Unauthorized Access, Unauthorized Disclosure of Information, Unauthorized Modification\n\nNOTICE: The information in this Security Bulletin should be acted upon as soon as possible. \n\nRelease Date: 2011-05-05\nLast Updated: 2011-05-05\n\nPotential Security Impact: Remote Denial of Service (DoS), unauthorized access, unauthorized disclosure of information, unauthorized modification\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nPotential vulnerabilities have been identified with HP Secure Web Server (SWS) for OpenVMS running Apache and PHP. The vulnerabilities could be remotely exploited to create a Denial of Service (DoS), unauthorized access, unauthorized disclosure of information, or unauthorized modifications. \n\nReferences: CVE-2002-0839, CVE-2002-0840, CVE-2003-0542, CVE-2004-0492, CVE-2005-2491, CVE-2005-3352, CVE-2005-3357, CVE-2006-2937, CVE-2006-2940, CVE-2006-3738, CVE-2006-3747, CVE-2006-3918, CVE-2006-4339, CVE-2006-4343, CVE-2007-5000, CVE-2007-6388, CVE-2008-0005, CVE-2009-1891, CVE-2009-3095, CVE-2009-3291, CVE-2009-3292, CVE-2009-3293, CVE-2009-3555, CVE-2010-0010\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP Secure Web Server (SWS) for OpenVMS (based on Apache) V2.1-1 and earlier. \n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2002-0839 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2\nCVE-2002-0840 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8\nCVE-2003-0542 (AV:L/AC:L/Au:N/C:C/I:C/A:C) 7.2\nCVE-2004-0492 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2005-2491 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2005-3352 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\nCVE-2005-3357 (AV:N/AC:H/Au:N/C:N/I:N/A:C) 5.4\nCVE-2006-2937 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8\nCVE-2006-2940 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8\nCVE-2006-3738 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2006-3747 (AV:N/AC:H/Au:N/C:C/I:C/A:C) 7.6\nCVE-2006-3918 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\nCVE-2006-4339 (AV:N/AC:M/Au:N/C:P/I:N/A:N) 4.3\nCVE-2006-4343 (AV:N/AC:M/Au:N/C:N/I:N/A:P) 4.3\nCVE-2007-5000 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\nCVE-2007-6388 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\nCVE-2008-0005 (AV:N/AC:M/Au:N/C:N/I:P/A:N) 4.3\nCVE-2009-1891 (AV:N/AC:M/Au:N/C:N/I:N/A:C) 7.1\nCVE-2009-3095 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2009-3291 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2009-3292 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2009-3293 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5\nCVE-2009-3555 (AV:N/AC:M/Au:N/C:N/I:P/A:P) 5.8\nCVE-2010-0010 (AV:N/AC:M/Au:N/C:P/I:P/A:P) 6.8\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has made the following software updates available to resolve these vulnerabilities. \n\nKit Name\n Location\n\nHP SWS V2.2 for OpenVMS Alpha and OpenVMS Integrity servers. \n http://h71000.www7.hp.com/openvms/products/ips/apache/csws.html\n\nCSWS_PHP V2.2\n http://h71000.www7.hp.com/openvms/products/ips/apache/csws_php.html\n\nHISTORY\nVersion:1 (rev.1) - 5 May 2011 Initial release\n\nThird Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer\u0027s patch management policy. \n\nSupport: For further information, contact normal HP Services support channel. \n\nReport: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com\nIt is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. \nTo get the security-alert PGP key, please send an e-mail message as follows:\n To: security-alert@hp.com\n Subject: get key\nSubscribe: To initiate a subscription to receive future HP Security Bulletins via Email:\nhttp://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA\u0026langcode=USENG\u0026jumpid=in_SC-GEN__driverITRC\u0026topiccode=ITRC\nOn the web page: ITRC security bulletins and patch sign-up\nUnder Step1: your ITRC security bulletins and patches\n -check ALL categories for which alerts are required and continue. \nUnder Step2: your ITRC operating systems\n -verify your operating system selections are checked and save. \n\nTo update an existing subscription: http://h30046.www3.hp.com/subSignIn.php\nLog in on the web page: Subscriber\u0027s choice for Business: sign-in. \nOn the web page: Subscriber\u0027s Choice: your profile summary - use Edit Profile to update appropriate sections. \n\nTo review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do\n\n* The Software Product Category that this Security Bulletin\nrelates to is represented by the 5th and 6th characters\nof the Bulletin number in the title:\n\nGN = HP General SW\nMA = HP Management Agents\nMI = Misc. 3rd Party SW\nMP = HP MPE/iX\nNS = HP NonStop Servers\nOV = HP OpenVMS\nPI = HP Printing \u0026 Imaging\nST = HP Storage SW\nTL = HP Trusted Linux\nTU = HP Tru64 UNIX\nUX = HP-UX\nVV = HP VirtualVault\n\nSystem management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. \n\n\"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user\u0027s use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement.\"\n\nCopyright 2011 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided \"as is\" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.10 (GNU/Linux)\n\niEUEARECAAYFAk3C8qwACgkQ4B86/C0qfVnBqgCYtJgc2OLmG0JEGU4sCpzntC4E\nHACgjeWEt9Ja5qNdjhL5iwOp3JVtVic=\n=EvRT\n-----END PGP SIGNATURE-----\n. This\nissue did not affect Debian 4.0 \"etch\". This would cause mod_deflate\nto consume large amounts of CPU if mod_deflate was enabled for a large\nfile. A similar flaw related to HEAD requests for compressed content\nwas also fixed. (CVE-2009-1891)\n\nFor the stable distribution (lenny), these problems have been fixed in\nversion 2.2.9-10+lenny4. \n\nThe oldstable distribution (etch), these problems have been fixed in\nversion 2.2.3-4+etch9. \n\nFor the testing distribution (squeeze) and the unstable distribution\n(sid), these problems will be fixed in version 2.2.11-7. \n\nThis advisory also provides updated apache2-mpm-itk packages which\nhave been recompiled against the new apache2 packages. \n\nUpdated packages for the s390 and mipsel architectures are not\nincluded yet. They will be released as soon as they become available. \n\nUpgrade instructions\n- --------------------\n\nwget url\n will fetch the file for you\ndpkg -i file.deb\n will install the referenced file. \n\nIf you are using the apt-get package manager, use the line for\nsources.list as given below:\n\napt-get update\n will update the internal database\napt-get upgrade\n will install corrected packages\n\nYou may use an automated update by adding the resources from the\nfooter to the proper configuration. \n\n\nDebian GNU/Linux 4.0 alias etch\n- -------------------------------\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3-4+etch9.diff.gz\n Size/MD5 checksum: 127065 2705ba251cdd2e979ce85099b4548848\n http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3-4+etch9.dsc\n Size/MD5 checksum: 1068 5090ccfce8dc2e193a0200a5046fc0c2\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3.diff.gz\n Size/MD5 checksum: 12705 7327720850092af23dae939c8b6e0268\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01.orig.tar.gz\n Size/MD5 checksum: 29071 63daaf8812777aacfd5a31ead4ff0061\n http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3.orig.tar.gz\n Size/MD5 checksum: 6342475 f72ffb176e2dc7b322be16508c09f63c\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3.dsc\n Size/MD5 checksum: 676 3823620d6958a99e0d9bf8d54172071e\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-src_2.2.3-4+etch9_all.deb\n Size/MD5 checksum: 6666600 863bd8f5274dcca2b348ddfb455f1e98\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-perchild_2.2.3-4+etch9_all.deb\n Size/MD5 checksum: 274258 632e77496c06ac55702187083210c5bd\n http://security.debian.org/pool/updates/main/a/apache2/apache2-doc_2.2.3-4+etch9_all.deb\n Size/MD5 checksum: 2243400 3c97cd0ed50e13730082455509ccf2ea\n http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3-4+etch9_all.deb\n Size/MD5 checksum: 41428 765f1df6239124b257a17373ec12a25c\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_alpha.deb\n Size/MD5 checksum: 184750 a5ab12e5997c22cc5384f4dd57039bf0\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_alpha.deb\n Size/MD5 checksum: 406786 9327ff1f134980e38e8af0a9bd333744\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_alpha.deb\n Size/MD5 checksum: 345748 e6aa3a131e39ea0da098cd68e769ca7b\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_alpha.deb\n Size/MD5 checksum: 407410 1f8fa482173f33fbf635c4d4b622d6dd\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_alpha.deb\n Size/MD5 checksum: 449496 f4bb6824e49f741d853b80c6cd1c34be\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_alpha.deb\n Size/MD5 checksum: 444670 26e6f91f3f21c9c3ce178abff526f8d6\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_alpha.deb\n Size/MD5 checksum: 1016848 234579bc27e5372455df962ae77da5ea\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_alpha.deb\n Size/MD5 checksum: 450004 8d41f42126489a657627549f3fd03236\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_amd64.deb\n Size/MD5 checksum: 408082 af95e2d0f5daba30588d20bee6ea1374\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_amd64.deb\n Size/MD5 checksum: 408766 8769e1922010d061afd64b917bf9ebfb\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_amd64.deb\n Size/MD5 checksum: 436036 83d55a3ec28d1d2954d5c524ace972ed\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_amd64.deb\n Size/MD5 checksum: 999314 86e7fb785110434ba47a93ad08dfbb46\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_amd64.deb\n Size/MD5 checksum: 432016 34bea3d8a903690047c0ce17dff9d0a8\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_amd64.deb\n Size/MD5 checksum: 172540 7e6a45df8e195f3871b1d5f333a832d7\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_amd64.deb\n Size/MD5 checksum: 341900 59846089ce413189c2a999b46ff9022c\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_amd64.deb\n Size/MD5 checksum: 436510 c697b045a1b6643f4aca8f75b6019688\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_arm.deb\n Size/MD5 checksum: 346122 69dc7042a32293cf61c6a037a0defcf2\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_arm.deb\n Size/MD5 checksum: 966476 cfe3ffb085393e3ed0d4c58a078b21c2\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_arm.deb\n Size/MD5 checksum: 422504 19091c57d38578606c074f637f5b9b77\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_arm.deb\n Size/MD5 checksum: 421738 91f192b72202b0266f64e418c6ecf419\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_arm.deb\n Size/MD5 checksum: 411030 5be3b5b0a332a274f16ac9fcfbfed59c\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_arm.deb\n Size/MD5 checksum: 411766 84009ab4d2335289437a721b2828f66e\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_arm.deb\n Size/MD5 checksum: 157456 c025f46f6df32cc58eb44c1fe43a0b95\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_arm.deb\n Size/MD5 checksum: 418168 90253c45e4e2ddd858144f0df7083881\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_hppa.deb\n Size/MD5 checksum: 443192 062ef8c245a4d94bff4ffaa7de4e80bc\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_hppa.deb\n Size/MD5 checksum: 1078368 3796cc564424fa9302f59ecdfb609e07\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_hppa.deb\n Size/MD5 checksum: 351892 a140b65fb1cd39922347fa9c3bfd3378\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_hppa.deb\n Size/MD5 checksum: 439772 d654376818ab21c08354d91354f774e4\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_hppa.deb\n Size/MD5 checksum: 410632 a287c471fe93b308f6b11262cd7a9f5a\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_hppa.deb\n Size/MD5 checksum: 409756 41555f1eb2b8a1f506b72521a45da883\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_hppa.deb\n Size/MD5 checksum: 443650 e1ce0eaf55fb5f75061ec379d86ed00f\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_hppa.deb\n Size/MD5 checksum: 179276 41098929aec66df2eb6aff15c65d185b\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_i386.deb\n Size/MD5 checksum: 423714 80ff91b5681b3b65b9f82510b78995d8\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_i386.deb\n Size/MD5 checksum: 342508 473c50b8e3b3ff72f61fd2773ad0a5ec\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_i386.deb\n Size/MD5 checksum: 419898 3efc018978b3f6879d4e17cd870da7c6\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_i386.deb\n Size/MD5 checksum: 962488 9f79ca5450eb153eeb77d0ccdf63af53\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_i386.deb\n Size/MD5 checksum: 424256 f7df4f2e8308b37945d6c9350fb68059\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_i386.deb\n Size/MD5 checksum: 160954 7bced5cbbed7133d3e7792b0aa40673c\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_i386.deb\n Size/MD5 checksum: 410094 c973180a87c19636cc18823d872eaaf5\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_i386.deb\n Size/MD5 checksum: 409096 aca126fc936879a914786d64b39582f1\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_ia64.deb\n Size/MD5 checksum: 231658 8588ce0e7b8f4ac4a486c3ee1f7e3f98\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_ia64.deb\n Size/MD5 checksum: 407390 c0070cc353345e43208362eb4b59fde2\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_ia64.deb\n Size/MD5 checksum: 490872 0e1504ba3f45642856d2fa0b961f8700\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_ia64.deb\n Size/MD5 checksum: 1203918 a0f6cbde5068600b39a1ecd4ec6a5b47\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_ia64.deb\n Size/MD5 checksum: 497934 5c8cd8e03d196f3bf950c11c48c4ee8b\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_ia64.deb\n Size/MD5 checksum: 360406 db46e71e165212b10d2fbda1a606cd98\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_ia64.deb\n Size/MD5 checksum: 497114 289213d2c49b217caf6a35d69f63e1e7\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_ia64.deb\n Size/MD5 checksum: 406772 84111944453e85d3abf713ae51826439\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_mips.deb\n Size/MD5 checksum: 170220 026044026baf1ce8467698a2a73aa5ab\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_mips.deb\n Size/MD5 checksum: 407938 b64b7c8cbc89b5a53ec2aaa58afec391\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_mips.deb\n Size/MD5 checksum: 433466 cbb48f0d929ce882c39d76966ba70193\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_mips.deb\n Size/MD5 checksum: 434190 ce951039761e140b5886fe57a255fa44\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_mips.deb\n Size/MD5 checksum: 348326 a718aad2980aa88aacd1d521c41de077\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_mips.deb\n Size/MD5 checksum: 409050 d35c3c4676678eb03b9661484051b391\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_mips.deb\n Size/MD5 checksum: 976346 6a45c13a7402ec443a17760e26483bf8\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_mips.deb\n Size/MD5 checksum: 429286 1bd2eed2169f0de38f651821aaa3da3b\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_powerpc.deb\n Size/MD5 checksum: 432192 906d504de8f20bc6c8ad1469a837e195\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_powerpc.deb\n Size/MD5 checksum: 406780 1e83caee969de1766eb5fc6067e76696\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_powerpc.deb\n Size/MD5 checksum: 427394 8a6ca2bdba868fdebeee23dda1f72701\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_powerpc.deb\n Size/MD5 checksum: 431602 90b2195a707a5b67745eabef4c2a8768\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_powerpc.deb\n Size/MD5 checksum: 1035070 0c620f29ceab742f65dad5eaf1d9d4f4\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_powerpc.deb\n Size/MD5 checksum: 353950 a0ba6038b988595e5a23dd1fb7639c4c\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_powerpc.deb\n Size/MD5 checksum: 407402 f0288619d689fc7dcf60860a4f36a933\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_powerpc.deb\n Size/MD5 checksum: 167642 c30002dbdc362dd5467146d1937dea53\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_sparc.deb\n Size/MD5 checksum: 418730 48e4d2f03309d7b24e3cde05a5b71a21\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_sparc.deb\n Size/MD5 checksum: 408606 1578768e504d10048c569485d9606289\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_sparc.deb\n Size/MD5 checksum: 157718 452a1e8f879fbc6d63a553d6baec602d\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_sparc.deb\n Size/MD5 checksum: 343654 ac6444870699cc33ad7f961eed9398ce\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_sparc.deb\n Size/MD5 checksum: 422500 5a8ce79508be63aa69c4df345bb0cee0\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_sparc.deb\n Size/MD5 checksum: 959220 b771edecfb5c7813eca216bfe66a3898\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_sparc.deb\n Size/MD5 checksum: 422118 6565c943000320159110ac22dcd5f559\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_sparc.deb\n Size/MD5 checksum: 409490 c1a6eba5bc28035aa796688e47e5e4dc\n\nDebian GNU/Linux 5.0 alias lenny\n- --------------------------------\n\nSource archives:\n\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2.dsc\n Size/MD5 checksum: 1164 307984cde328f4d612ab19f783850723\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2.diff.gz\n Size/MD5 checksum: 13140 adfb807359e881c02f62c979a1f3728b\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02.orig.tar.gz\n Size/MD5 checksum: 33295 1da861a142f8d0d2e2a5bfbc7c760199\n http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny4.diff.gz\n Size/MD5 checksum: 138623 e83f70e3fe9dc21e23b9e12e0e3509a2\n http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny4.dsc\n Size/MD5 checksum: 1673 3edbeef1b78cdcb238a1b156b1e15bb3\n http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9.orig.tar.gz\n Size/MD5 checksum: 6396996 80d3754fc278338033296f0d41ef2c04\n\nArchitecture independent packages:\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-src_2.2.9-10+lenny4_all.deb\n Size/MD5 checksum: 6734400 79b3f9d5db6aa727567fbe8465ff90d4\n http://security.debian.org/pool/updates/main/a/apache2/apache2-doc_2.2.9-10+lenny4_all.deb\n Size/MD5 checksum: 2060300 196001254f77a940ad90c9b71a852e77\n http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny4_all.deb\n Size/MD5 checksum: 44714 bc0ebb5a9da11e825827315a6899abfb\n\nalpha architecture (DEC Alpha)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_alpha.deb\n Size/MD5 checksum: 847834 aaf8837f7c08aca3d011376dcffc7e16\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_alpha.deb\n Size/MD5 checksum: 147370 dbb9268ff94f758a080b6e8a05a4bdf2\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_alpha.deb\n Size/MD5 checksum: 261110 83e82a6a01480d834aa5339e24f5969a\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_alpha.deb\n Size/MD5 checksum: 256066 96f6245fa6e4ed746ef8262233f503ad\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_alpha.deb\n Size/MD5 checksum: 208196 6ee84eaafd8eb561b9a439dcbb783236\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_alpha.deb\n Size/MD5 checksum: 261798 a1229304be029b88e4f5c398f91f4e40\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_alpha.deb\n Size/MD5 checksum: 83944 8b74c4d4c39b5ac398710dab602337e2\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_alpha.deb\n Size/MD5 checksum: 209246 bc34fe81b34a34e0dc9f7ead8de8fe1a\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_alpha.deb\n Size/MD5 checksum: 198092 4881bbe2b0e5b4f348877e7ea627ce52\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_alpha.deb\n Size/MD5 checksum: 2401116 319b1da984a7f71cc3c7a7a5ba49b867\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_alpha.deb\n Size/MD5 checksum: 82234 4c29b98521c49ac1ecbc8d6c011abdfa\n\namd64 architecture (AMD x86_64 (AMD64))\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_amd64.deb\n Size/MD5 checksum: 144626 5d4768acfae476c402e6fc4691b4546e\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_amd64.deb\n Size/MD5 checksum: 209292 67863fa88619fd577003df2aa7cce0e0\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_amd64.deb\n Size/MD5 checksum: 82096 a98e3f9008a265b60353de3951e2e398\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_amd64.deb\n Size/MD5 checksum: 208304 57c865b54fb1cc86c4a8cfab227bc306\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_amd64.deb\n Size/MD5 checksum: 253304 074663f709a0bf0ee633455f80fee628\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_amd64.deb\n Size/MD5 checksum: 257894 6360df03503d90a3d3ce328b864e6f51\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_amd64.deb\n Size/MD5 checksum: 2461864 89f24f597409e1c28c269d480c73e3e4\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_amd64.deb\n Size/MD5 checksum: 195110 701e3f4e5f285547da2812995f2633c6\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_amd64.deb\n Size/MD5 checksum: 257386 4d91795d2a2fad9cdf6b68339b4829b6\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_amd64.deb\n Size/MD5 checksum: 83788 5316f2c34b8b48c4add784cc76753456\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_amd64.deb\n Size/MD5 checksum: 814092 20325906f84a4e8fe2d44facc5b6b5d3\n\narm architecture (ARM)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_arm.deb\n Size/MD5 checksum: 2325038 1d76ab85e35d2cbba2f03e27a298e94c\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_arm.deb\n Size/MD5 checksum: 80888 86bf973a332a92a29382ee8a46a6c026\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_arm.deb\n Size/MD5 checksum: 785978 52f17dbf1fee0cd55ee9009fdd4f0fd8\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_arm.deb\n Size/MD5 checksum: 223420 dff6ac226c23cf2a09203988d7a2b9f1\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_arm.deb\n Size/MD5 checksum: 161996 1a897301ece23202fcfa1237255fc4d2\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_arm.deb\n Size/MD5 checksum: 82676 d9fbdef2dff08820870956f9657a58e6\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_arm.deb\n Size/MD5 checksum: 219532 71eacc1f45625b1df19e76d75e3ba3c6\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_arm.deb\n Size/MD5 checksum: 146788 ac12d8e6bdf36cb3dcdc25cb18e3e30a\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_arm.deb\n Size/MD5 checksum: 210508 a21d73a92f2afc9fe444e8605a17b217\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_arm.deb\n Size/MD5 checksum: 224274 522c6f94729d2a1dee88587c915d519d\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_arm.deb\n Size/MD5 checksum: 209360 e929d57bd87b4274b164957b1ddecd28\n\narmel architecture (ARM EABI)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_armel.deb\n Size/MD5 checksum: 225576 b0dcffd0883f47503ccf734f18852ad0\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_armel.deb\n Size/MD5 checksum: 801902 185f8929c05f1908bcaa8b860f389578\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_armel.deb\n Size/MD5 checksum: 221418 c65a0ed2b6c24ca34b7b8eaf89b371d4\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_armel.deb\n Size/MD5 checksum: 2339212 8774ee70034af693ad839a1a32cb8349\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_armel.deb\n Size/MD5 checksum: 162788 1af310dc30900cb2351f0b72700f1b6a\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_armel.deb\n Size/MD5 checksum: 83420 d8880a371ce336eb07ecdb6560658a9d\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_armel.deb\n Size/MD5 checksum: 150670 d78e5498f0eef77186479e10bb91b6b1\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_armel.deb\n Size/MD5 checksum: 213296 2bab992f24e1772284062500f3574524\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_armel.deb\n Size/MD5 checksum: 212144 216add040a936ef2981edc7d9561e114\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_armel.deb\n Size/MD5 checksum: 81784 cac9e229181c8437b445bdfb8812c3c4\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_armel.deb\n Size/MD5 checksum: 225852 ae8ac07aacb889e9f3e6c59c8b511fcf\n\nhppa architecture (HP PA RISC)\n\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_hppa.deb\n Size/MD5 checksum: 183160 f2b39550c5f7e82e489c912166d9979e\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_hppa.deb\n Size/MD5 checksum: 152354 065c6e2360f9a561032ff001da648d4d\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_hppa.deb\n Size/MD5 checksum: 83830 de830f6d2a404e47907eff31c8e500f8\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_hppa.deb\n Size/MD5 checksum: 82196 16539b99fc2144c8bcfcd7af8d0ab185\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_hppa.deb\n Size/MD5 checksum: 246170 7d2bc68a96df307fed56456b73f03b66\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_hppa.deb\n Size/MD5 checksum: 246644 3047579aa5229cd6015dbb1e4235bd5e\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_hppa.deb\n Size/MD5 checksum: 888518 69936f2c0a47f50d1656d42a1f07be60\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_hppa.deb\n Size/MD5 checksum: 211744 a16842a731424f0da311c9ad06db1e6d\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_hppa.deb\n Size/MD5 checksum: 2380288 cd896ebb2704567cb74f3d0ee7e0eb4d\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_hppa.deb\n Size/MD5 checksum: 210730 716d95b564b12cf4a3a44d3b847d1718\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_hppa.deb\n Size/MD5 checksum: 241526 9e86d0c72e5c01770d5b9a403eea1931\n\ni386 architecture (Intel ia32)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_i386.deb\n Size/MD5 checksum: 2321656 ec028a4db5a43f4ed9ad5be64752d03a\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_i386.deb\n Size/MD5 checksum: 236982 db7f962144ad83c02e89cf774292288b\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_i386.deb\n Size/MD5 checksum: 81826 14dc03b9022352f6ca89cc18d5a0330e\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_i386.deb\n Size/MD5 checksum: 178820 b6a82b00259627a7f7fb593d9b011766\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_i386.deb\n Size/MD5 checksum: 83576 1bada724cf9b6dd9f63c650467efeba9\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_i386.deb\n Size/MD5 checksum: 142984 a5f47b4e360f4dfb1af40edc0fd4b029\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_i386.deb\n Size/MD5 checksum: 212226 962c9711427d4b3040f2682cc76ab86a\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_i386.deb\n Size/MD5 checksum: 240950 d071d125f52595d24d7ce27a700125b2\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_i386.deb\n Size/MD5 checksum: 782590 91c5374730252660a652998778f37d8d\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_i386.deb\n Size/MD5 checksum: 210906 c3f8cc33efaf94bb394269a70c71a0d1\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_i386.deb\n Size/MD5 checksum: 240464 5354fbeaf0547f9a42bb15093325f549\n\nia64 architecture (Intel ia64)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_ia64.deb\n Size/MD5 checksum: 311214 f283915f5e76d3cd640589d549a76a71\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_ia64.deb\n Size/MD5 checksum: 85302 ff6953155bfaf472969417b48b2551f8\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_ia64.deb\n Size/MD5 checksum: 1035884 aa5c4d97a05db590c5f3f2cf4d19c555\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_ia64.deb\n Size/MD5 checksum: 2316556 d26cb59c9177ec0e71a95ad856d4e051\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_ia64.deb\n Size/MD5 checksum: 246932 42ab72304a76a62f65836b6c60c73010\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_ia64.deb\n Size/MD5 checksum: 312166 f58ecace375bd6b35f1a4062748c5408\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_ia64.deb\n Size/MD5 checksum: 209228 559adca455e0ef1f204e96ac4fbe49ef\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_ia64.deb\n Size/MD5 checksum: 162262 ba2b1c266c3587a302212bf4f2ed240f\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_ia64.deb\n Size/MD5 checksum: 208174 8c9fe75a24cde7114b2f7652537deecd\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_ia64.deb\n Size/MD5 checksum: 83422 1779b4541944fa8a94a1dd33e4cbc609\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_ia64.deb\n Size/MD5 checksum: 304150 4a2c480a73e0ed79b46b05b58fe0fd61\n\nmips architecture (MIPS (Big Endian))\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_mips.deb\n Size/MD5 checksum: 83190 e093dfcad8021f25f7176da924459c6c\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_mips.deb\n Size/MD5 checksum: 170822 294522178e939a92592d5d146b68cd9d\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_mips.deb\n Size/MD5 checksum: 233580 961e112fcdeacc251dee947f8f724aa8\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_mips.deb\n Size/MD5 checksum: 232924 52a97e65bdccc87e309a82234ab89dab\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_mips.deb\n Size/MD5 checksum: 149230 9708268be4f09ba11e5bb51179d928f2\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_mips.deb\n Size/MD5 checksum: 779762 d2c17dcc02d84293914bb3f4f6ab67d3\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_mips.deb\n Size/MD5 checksum: 228990 a141cf37d468e74442cbcd7012925e44\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_mips.deb\n Size/MD5 checksum: 208192 33165f7a8cb46d7c296c248955128218\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_mips.deb\n Size/MD5 checksum: 209244 b016214150d6ce9a7e43e64a851f5978\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_mips.deb\n Size/MD5 checksum: 81522 1abe52816f5a0d8c00e3b2fb1879414f\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_mips.deb\n Size/MD5 checksum: 2463130 344c79f122bab946da9fc39f9a8a4b36\n\npowerpc architecture (PowerPC)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_powerpc.deb\n Size/MD5 checksum: 257046 c952768064ed400bb2e1d9e27e4ba99a\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_powerpc.deb\n Size/MD5 checksum: 84070 e17bd8d31a36da03bef16415993e7e45\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_powerpc.deb\n Size/MD5 checksum: 915634 53944e6d790f63ca816bf2136b79af3e\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_powerpc.deb\n Size/MD5 checksum: 208218 b9e3f2e66531d56bb570424353272102\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_powerpc.deb\n Size/MD5 checksum: 82412 766b0d2515db8ffeb85dca4b484105f1\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_powerpc.deb\n Size/MD5 checksum: 160476 8d0ecf34f8000fd940c921a0b3d4e548\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_powerpc.deb\n Size/MD5 checksum: 209268 cf420bf9a74835ea64697f91b87803c4\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_powerpc.deb\n Size/MD5 checksum: 257776 b6177ff3288d6b330f88be5c66257fb0\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_powerpc.deb\n Size/MD5 checksum: 2495370 fd4dd820e677dc7e70c76e1fab8e92f6\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_powerpc.deb\n Size/MD5 checksum: 252980 dc623a508aba2b5686b91b8dbaa960c8\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_powerpc.deb\n Size/MD5 checksum: 195282 f195b72bd2cb69fd34dad3e784789140\n\ns390 architecture (IBM S/390)\n\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_s390.deb\n Size/MD5 checksum: 259520 fbaaf66f397575413ef453aa722144e8\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_s390.deb\n Size/MD5 checksum: 260108 2ae0ee8cc14adc7968258bd08a3e81ed\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_s390.deb\n Size/MD5 checksum: 822996 d30704ff33a6aa78bbbd45a6f7ac0143\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_s390.deb\n Size/MD5 checksum: 208180 38718b3016843e4c6143b42d3b305303\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_s390.deb\n Size/MD5 checksum: 150432 c4efb820040316a31f1b101c52234ead\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_s390.deb\n Size/MD5 checksum: 209230 7f38737a3435372a60be9bb1d55e28cb\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_s390.deb\n Size/MD5 checksum: 83810 b975c720b2dfef46c355d4c46fe11981\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_s390.deb\n Size/MD5 checksum: 82046 9c1ef780cb0b791585ca092084672204\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_s390.deb\n Size/MD5 checksum: 2405236 abbada7447e8b5870bf8a8bf88a63ef2\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_s390.deb\n Size/MD5 checksum: 255468 ff853775f302788837c58af1e78992c6\n\nsparc architecture (Sun SPARC/UltraSPARC)\n\n http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_sparc.deb\n Size/MD5 checksum: 177430 6fc629e355d1631ffb88b8614d9fea10\n http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_sparc.deb\n Size/MD5 checksum: 2230948 0139ae6fb585ca7299549ff59e5317b8\n http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_sparc.deb\n Size/MD5 checksum: 210438 fe77b48974cfb980f1cbfd744cdab798\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_sparc.deb\n Size/MD5 checksum: 236456 2f7cf5cb7aa7eb2b40a914894c7aa883\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_sparc.deb\n Size/MD5 checksum: 83162 7c17c245241db944b85ca8972a19a785\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_sparc.deb\n Size/MD5 checksum: 240688 713eb6278ca62f82ed6837480fa278de\n http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_sparc.deb\n Size/MD5 checksum: 81388 b76095bbe6e716c35f6b1f2f76a35428\n http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_sparc.deb\n Size/MD5 checksum: 240168 6fa24064bf73b944fb41beea7b95f66e\n http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_sparc.deb\n Size/MD5 checksum: 211722 92acf170832b8d56e67dbd0760459e47\n http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_sparc.deb\n Size/MD5 checksum: 147228 a166a6f2e75dbedd9e3795af1b1f34af\n http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_sparc.deb\n Size/MD5 checksum: 780484 cfec1976f87aee4535b0de9df3410127\n\n\n These files will probably be moved into the stable distribution on\n its next update. ===========================================================\nUbuntu Security Notice USN-802-1 July 13, 2009\napache2 vulnerabilities\nCVE-2009-1890, CVE-2009-1891\n===========================================================\n\nA security issue affects the following Ubuntu releases:\n\nUbuntu 6.06 LTS\nUbuntu 8.04 LTS\nUbuntu 8.10\nUbuntu 9.04\n\nThis advisory also applies to the corresponding versions of\nKubuntu, Edubuntu, and Xubuntu. \n\nThe problem can be corrected by upgrading your system to the\nfollowing package versions:\n\nUbuntu 6.06 LTS:\n apache2-common 2.0.55-4ubuntu2.6\n apache2-mpm-perchild 2.0.55-4ubuntu2.6\n apache2-mpm-prefork 2.0.55-4ubuntu2.6\n apache2-mpm-worker 2.0.55-4ubuntu2.6\n libapr0 2.0.55-4ubuntu2.6\n\nUbuntu 8.04 LTS:\n apache2-mpm-event 2.2.8-1ubuntu0.10\n apache2-mpm-perchild 2.2.8-1ubuntu0.10\n apache2-mpm-prefork 2.2.8-1ubuntu0.10\n apache2-mpm-worker 2.2.8-1ubuntu0.10\n apache2.2-common 2.2.8-1ubuntu0.10\n\nUbuntu 8.10:\n apache2-mpm-event 2.2.9-7ubuntu3.2\n apache2-mpm-prefork 2.2.9-7ubuntu3.2\n apache2-mpm-worker 2.2.9-7ubuntu3.2\n apache2.2-common 2.2.9-7ubuntu3.2\n\nUbuntu 9.04:\n apache2-mpm-event 2.2.11-2ubuntu2.2\n apache2-mpm-prefork 2.2.11-2ubuntu2.2\n apache2-mpm-worker 2.2.11-2ubuntu2.2\n apache2.2-common 2.2.11-2ubuntu2.2\n\nIn general, a standard system upgrade is sufficient to effect the\nnecessary changes. A remote attacker\ncould exploit this and cause a denial of service via memory resource\nconsumption. (CVE-2009-1891)\n\n\nUpdated packages for Ubuntu 6.06 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6.diff.gz\n Size/MD5: 125440 0835eafec701c6f327e82270dca754a1\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6.dsc\n Size/MD5: 1156 13cf43efabdc8e2180ade01709ff4063\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55.orig.tar.gz\n Size/MD5: 6092031 45e32c9432a8e3cf4227f5af91b03622\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.0.55-4ubuntu2.6_all.deb\n Size/MD5: 2125302 f97b87210dc35e7cf1b4014d755f5cc2\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.6_amd64.deb\n Size/MD5: 833688 123cb5995bd422cf218db15691284ed2\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.6_amd64.deb\n Size/MD5: 228978 33ea13f64f33acb69b73ad4c2fdfd9ff\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.6_amd64.deb\n Size/MD5: 223958 e94df0f2fdcf8d0bf9e95d5149c58f73\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.6_amd64.deb\n Size/MD5: 228556 4e0c0d0ff7fc315c30250fb3d828cdfd\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.6_amd64.deb\n Size/MD5: 172066 1f4106b81cc09f4bd78e066aef94201b\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.6_amd64.deb\n Size/MD5: 172850 3b433ffaca5e5e36f7ebc2881fd7f1a5\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.6_amd64.deb\n Size/MD5: 94914 b872cbff9cda76856337a278dba5a9ca\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6_amd64.deb\n Size/MD5: 36956 f628faa804ed2c2b5525952fbd94d5ca\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.6_amd64.deb\n Size/MD5: 286398 3ebb11712b0466f2c3d0b5243d1a0339\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.6_amd64.deb\n Size/MD5: 144970 a8e8615104349a395c695915079eab69\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.6_i386.deb\n Size/MD5: 786908 1c3f456b2c87dcf5fd21c9e783f4d06d\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.6_i386.deb\n Size/MD5: 203576 772d6129a7ef92cf5887c25466fda11b\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.6_i386.deb\n Size/MD5: 199470 315e863b2ad6aa1b669e7914cebc38a8\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.6_i386.deb\n Size/MD5: 203002 573f96a5d3787106c8d6007d8afb88f6\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.6_i386.deb\n Size/MD5: 172066 57fcc673853907cc24c432ef8b0f8e94\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.6_i386.deb\n Size/MD5: 172834 85320d327250cf86fd6c48813384bdc0\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.6_i386.deb\n Size/MD5: 92862 d774e289f718d119dad6e765fd900679\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6_i386.deb\n Size/MD5: 36958 9b8758253a277d81c02b1c9fd50b8eba\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.6_i386.deb\n Size/MD5: 262426 668cbde23862b43743e935ca8ff24e8a\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.6_i386.deb\n Size/MD5: 132884 f0bbccb2fc0f96b88b124c6942b9d957\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.6_powerpc.deb\n Size/MD5: 859782 b3d991a69f5703d9e1339eafd0b5df17\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.6_powerpc.deb\n Size/MD5: 220946 098441a8af78db25aea174320ffcd409\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.6_powerpc.deb\n Size/MD5: 216552 a381af581b41112ac975fca40bec02e6\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.6_powerpc.deb\n Size/MD5: 220496 0d5ff99a81d4581edca2effaf04f1473\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.6_powerpc.deb\n Size/MD5: 172052 84e4b88525b4ce0923c898264dbfea5a\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.6_powerpc.deb\n Size/MD5: 172850 159e27770e6f51e03f5284ea7f5ca190\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.6_powerpc.deb\n Size/MD5: 104626 e320d5a9527e39d1998f7212db15825e\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6_powerpc.deb\n Size/MD5: 36960 cdb428ea696ff7e0aaa972041839aef2\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.6_powerpc.deb\n Size/MD5: 281970 80f4c670c5c142303b7da95ec7f86b25\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.6_powerpc.deb\n Size/MD5: 142094 630a20d53c2ffe01b38c9c9e53badb37\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.6_sparc.deb\n Size/MD5: 804084 1025f38adde2a04a719393d5693dbd68\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.6_sparc.deb\n Size/MD5: 211136 73ae94138fb8b3e4dfbc1c9d5079a92c\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.6_sparc.deb\n Size/MD5: 206806 431b7e7e3462e125d141ee9ec55a7825\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.6_sparc.deb\n Size/MD5: 210416 a2ce963e90818b3093d990f4632c4e8a\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.6_sparc.deb\n Size/MD5: 172070 8335845d072dc411e8e670807dc7c604\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.6_sparc.deb\n Size/MD5: 172850 93e8d610d683005695699a153c40ce06\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.6_sparc.deb\n Size/MD5: 93966 87d7968cec960afde5f9996803ac8a8a\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6_sparc.deb\n Size/MD5: 36956 585634ecaa1af88b1d92ab48feed15f7\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.6_sparc.deb\n Size/MD5: 268546 c2b2894973ed231bf0292100ca662ced\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.6_sparc.deb\n Size/MD5: 130872 f109c1fe224df9957a8837358365c750\n\nUpdated packages for Ubuntu 8.04 LTS:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.10.diff.gz\n Size/MD5: 135972 a2c9442eec99007779a145e71ba68b30\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.10.dsc\n Size/MD5: 1381 54f6072ce246ebc26a350fb53e5c99bc\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8.orig.tar.gz\n Size/MD5: 6125771 39a755eb0f584c279336387b321e3dfc\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.8-1ubuntu0.10_all.deb\n Size/MD5: 1928676 7231ea6584bc9b64c87d84a2fd7e5d00\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.2.8-1ubuntu0.10_all.deb\n Size/MD5: 72560 abbc80191e059fce87c599f947b3b402\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-src_2.2.8-1ubuntu0.10_all.deb\n Size/MD5: 6256206 e50391cd977f7df987c13e17bb163f8f\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.10_all.deb\n Size/MD5: 45482 a40b40465c3f99f1dd15f8bc85d24b23\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.10_amd64.deb\n Size/MD5: 252722 95177119382131308fb3dcf98507a15c\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.10_amd64.deb\n Size/MD5: 248352 20792be8ccf5b73e46ec4ca3f8c0726b\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.10_amd64.deb\n Size/MD5: 252114 3a45c61b120d53327f52b101da77fe8f\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.10_amd64.deb\n Size/MD5: 205226 1cdb16ee59e67550d536fc1ca2bf7576\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.10_amd64.deb\n Size/MD5: 205994 93adabf4102d299fb420a764a8cbfe33\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.10_amd64.deb\n Size/MD5: 141320 11fbd8d338da9da4fb2cfa47411e23b4\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.10_amd64.deb\n Size/MD5: 803332 f31a349c870550a044ac939c4876ead3\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.10_i386.deb\n Size/MD5: 235638 840b0a0bd4399a9799da6f42df7ccbb4\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.10_i386.deb\n Size/MD5: 231238 6a4d251375dc0f811f427ed3377ac0ab\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.10_i386.deb\n Size/MD5: 234880 354e2a88b0dbc19a10a5294879a507b1\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.10_i386.deb\n Size/MD5: 205234 21900ec04423fb920197870e470b9aa7\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.10_i386.deb\n Size/MD5: 206016 8796b13fb273f61c6c7c4bfb9adbe6aa\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.10_i386.deb\n Size/MD5: 140294 ea6f40b6c12c27851a9f4f1e88aed544\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.10_i386.deb\n Size/MD5: 754978 2ba7c3f44c9a5ed197c932232dad4808\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.10_lpia.deb\n Size/MD5: 235176 6248fed01caabbfb4d70d0c13c7f17f5\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.10_lpia.deb\n Size/MD5: 230866 95f247897f3bd77ea304dfd6c9dfd85c\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.10_lpia.deb\n Size/MD5: 234344 987ff978cbacde11bc7353702973d125\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.10_lpia.deb\n Size/MD5: 205230 d7576f846491b2833c50f39cc1b0dc75\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.10_lpia.deb\n Size/MD5: 206002 0e1b63983e424122ed1d39826d76335c\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.10_lpia.deb\n Size/MD5: 140878 ce996c6cb3ec3552302869ae2256b20e\n http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.10_lpia.deb\n Size/MD5: 749176 d26c165846c36706ed1d7590a8be3f7b\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.10_powerpc.deb\n Size/MD5: 253754 33add2865e4cd1c43a43895870454361\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.10_powerpc.deb\n Size/MD5: 249222 538a952111c80146dd1887b556f7116b\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.10_powerpc.deb\n Size/MD5: 253320 ad19124a89163a1f1d2212a3ac67a3fc\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.10_powerpc.deb\n Size/MD5: 205240 46728c8422948938f06a02677c2a5c77\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.10_powerpc.deb\n Size/MD5: 206016 05d6ac042561eb4ea302c90540c64528\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.10_powerpc.deb\n Size/MD5: 158034 051b060ed2dd44f5271401e4acc2b9b4\n http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.10_powerpc.deb\n Size/MD5: 905448 a839a4301bca447e91e58174aebad9be\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.10_sparc.deb\n Size/MD5: 237026 7f91acb658058ba572cfc7d223e9968c\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.10_sparc.deb\n Size/MD5: 232794 8af73b6967e695bfcbb900bf0423a366\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.10_sparc.deb\n Size/MD5: 236262 ca2efbd5beef24f97cc4e94f0d45e511\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.10_sparc.deb\n Size/MD5: 205236 11ce3c413997a7203a2b1ddf2c7b608c\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.10_sparc.deb\n Size/MD5: 206016 0b11cbb82ae743d2300a5da249af99a7\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.10_sparc.deb\n Size/MD5: 143500 00c0a815768281a1939510ecf16615bc\n http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.10_sparc.deb\n Size/MD5: 764418 f1356117d9a2825fc87cb91344704e03\n\nUpdated packages for Ubuntu 8.10:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9-7ubuntu3.2.diff.gz\n Size/MD5: 132027 05239552b7a95f91eef1d7606ef280c4\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9-7ubuntu3.2.dsc\n Size/MD5: 1788 423154f094b3f5629e698638d9505a01\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9.orig.tar.gz\n Size/MD5: 6396996 80d3754fc278338033296f0d41ef2c04\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.9-7ubuntu3.2_all.deb\n Size/MD5: 2041678 859eb46d09d45f53599d9d0a71f2fa89\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-src_2.2.9-7ubuntu3.2_all.deb\n Size/MD5: 6536854 e3572b1d683e4ee6967779dd07b637fd\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9-7ubuntu3.2_all.deb\n Size/MD5: 45150 0ff7bf10b5bef6cf7258e6223f78736d\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.2_amd64.deb\n Size/MD5: 254642 9f3bb3444753ace1ca55651c68924739\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.2_amd64.deb\n Size/MD5: 248846 00267b5ab16a55aed008578fbdb24bed\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.2_amd64.deb\n Size/MD5: 254018 81085b6d61faeb846e94b1a3bf8eb6a2\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.2_amd64.deb\n Size/MD5: 208170 8e360619ff15112e636aaedc0340f1ee\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.2_amd64.deb\n Size/MD5: 84142 3eaf3d803d582d3eb6fb29a79251df69\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.2_amd64.deb\n Size/MD5: 82494 8f293a595f34d6710adb931d5dbcaf0f\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.2_amd64.deb\n Size/MD5: 209220 73d2d91d313b951f643bf413467c4e5a\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.2_amd64.deb\n Size/MD5: 147398 8a772d1dfdb49bae605bd7dee3f9f436\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.2_amd64.deb\n Size/MD5: 819864 42aeca74c2ee5d0f5a5a4e10037ece11\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.2_i386.deb\n Size/MD5: 240962 6427fbd76596cbe52029e6ed5a7da703\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.2_i386.deb\n Size/MD5: 235678 5155e38f8137c85b9c229b4eafa144e3\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.2_i386.deb\n Size/MD5: 240298 9f4f26b4d98d8707e15b6b7d02430e5e\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.2_i386.deb\n Size/MD5: 208190 f68c7d60a09d53af6a8c8640b05e4ad9\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.2_i386.deb\n Size/MD5: 83572 dd5d339c3e3af404aa3ffd0904ec6c7c\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.2_i386.deb\n Size/MD5: 81968 7c7775dc8c89c4f7aec5f8c8a5f26e60\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.2_i386.deb\n Size/MD5: 209236 079855f2fdc6843758bcad41421a46ea\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.2_i386.deb\n Size/MD5: 146240 0b7ff0f038c7c40d84a1f342a1bbefca\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.2_i386.deb\n Size/MD5: 778084 226ed90dc2ba09af3a38dcc40b38d834\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.2_lpia.deb\n Size/MD5: 237982 7c7a5daf494862704d28d5c85d6c31cc\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.2_lpia.deb\n Size/MD5: 232612 96ea385cf513d314d8e84a4c442cc234\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.2_lpia.deb\n Size/MD5: 237230 4003bab7bbb427b1e9ec0e6d97c3e69b\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.2_lpia.deb\n Size/MD5: 208176 af28e327890eaddff4108231268eee6e\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.2_lpia.deb\n Size/MD5: 83530 4725b6872ac3ac9ad1ae62ba03592964\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.2_lpia.deb\n Size/MD5: 81950 adf39a429f5c04b6a5976c0b5ff30cd4\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.2_lpia.deb\n Size/MD5: 209232 477e0f43b36e9961c13b6c0fab7a0dc1\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.2_lpia.deb\n Size/MD5: 145928 6089cb1b3efa73128a00a237165076ea\n http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.2_lpia.deb\n Size/MD5: 766230 f876845ac3aae12ef2e0f36996531ef0\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.2_powerpc.deb\n Size/MD5: 261150 afc86ac304cdc5af1550d346a8f8a3f9\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.2_powerpc.deb\n Size/MD5: 255750 b301c6b3f3b4ae21e5ef5cb7ffb56683\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.2_powerpc.deb\n Size/MD5: 260470 4c333c87af3a087faeec0da6a282295b\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.2_powerpc.deb\n Size/MD5: 208184 94332d103f410b07c99d2f849e108ec6\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.2_powerpc.deb\n Size/MD5: 84210 edb9eb638c12753a58a5d582ecaa60fa\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.2_powerpc.deb\n Size/MD5: 82556 356606fd10fe199eda49ba3258de85e4\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.2_powerpc.deb\n Size/MD5: 209232 0691c4dd34cb05a93799caa9929104d4\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.2_powerpc.deb\n Size/MD5: 160676 43a1b64573dd41946dec05b7afeeccf8\n http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.2_powerpc.deb\n Size/MD5: 925826 7a95a689bc4e8a0462e9d8e43ac88f5d\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.2_sparc.deb\n Size/MD5: 246372 db9d10ebc566f9f50210670fc8882819\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.2_sparc.deb\n Size/MD5: 240922 2b5b20a703e7f5d8fbc50fb1ee0b40f4\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.2_sparc.deb\n Size/MD5: 245692 76832085d1b4ffd02948c9ac7b92b54e\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.2_sparc.deb\n Size/MD5: 208196 f6355dfafe95b8915593d514d6ec4cdc\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.2_sparc.deb\n Size/MD5: 83754 2aa37c091a042bd92eea616af4eaa13d\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.2_sparc.deb\n Size/MD5: 82126 dae25ab8ca9612b725ea89fb22cee433\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.2_sparc.deb\n Size/MD5: 209240 a93acaff6c5151aeddbbdeb335a1c8da\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.2_sparc.deb\n Size/MD5: 150576 43675606769e8ea6cbc172bbdf31ea09\n http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.2_sparc.deb\n Size/MD5: 783584 323183add2eaf6e1360c9eefcf0d5f8a\n\nUpdated packages for Ubuntu 9.04:\n\n Source archives:\n\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.2.diff.gz\n Size/MD5: 135188 d64295fbf395fedc32558e37c89dd582\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.2.dsc\n Size/MD5: 1795 45bf7dad8a81012c187e219c6c863c9d\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11.orig.tar.gz\n Size/MD5: 6806786 03e0a99a5de0f3f568a0087fb9993af9\n\n Architecture independent packages:\n\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.11-2ubuntu2.2_all.deb\n Size/MD5: 2218918 e157363876dbb978176c6ba59dc01d61\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.2_all.deb\n Size/MD5: 46278 58851aa10579254cdb4d9f89e8b597c5\n http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-src_2.2.11-2ubuntu2.2_all.deb\n Size/MD5: 6946286 067a7635b8627b031b9eb9cf0cc847bf\n\n amd64 architecture (Athlon64, Opteron, EM64T Xeon):\n\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.2_amd64.deb\n Size/MD5: 258646 7446874f9db13dea5da20f225024f477\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.2_amd64.deb\n Size/MD5: 252848 823147209be87ff9322c276a8e2beace\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.2_amd64.deb\n Size/MD5: 258024 6bfdbf469c0b0ba45e543bf7688ac5ee\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.2_amd64.deb\n Size/MD5: 212932 aeeb0ccb1f8e72a15aaf08450a056c1c\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.2_amd64.deb\n Size/MD5: 213906 8621b4d1d85ab19f154a86ec465fa316\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.2_amd64.deb\n Size/MD5: 150776 f7def056c536f9b1a329a3b6fef43b7f\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.2_amd64.deb\n Size/MD5: 826672 e18163156730829c91161191ee00b340\n http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.2_amd64.deb\n Size/MD5: 87442 39f0e4aaf42e4bb049da17f26a0d9c25\n http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.2_amd64.deb\n Size/MD5: 85730 a11a39f7102937e5d00b03190ff42a60\n\n i386 architecture (x86 compatible Intel/AMD):\n\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.2_i386.deb\n Size/MD5: 245132 c7202ff8f066903e207ebff93557644a\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.2_i386.deb\n Size/MD5: 239670 18279b3faf8344f9e7f903862114c998\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.2_i386.deb\n Size/MD5: 244518 c24b66a4a61c2af8edf32b10867cf958\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.2_i386.deb\n Size/MD5: 212922 a009d9ba9486ba53a3441ca2a48bc9d8\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.2_i386.deb\n Size/MD5: 213898 6e26de281d137dfab7dbc700ca1f7eb5\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.2_i386.deb\n Size/MD5: 149678 d4499d622b98d7a9ed3a1b700f954e95\n http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.2_i386.deb\n Size/MD5: 783924 45fbb8ab4bfa3297b0e04231677f86a1\n http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.2_i386.deb\n Size/MD5: 86818 9d01aae1849d4ccc93c64e7640912b64\n http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.2_i386.deb\n Size/MD5: 85222 0a3f70a6697f945a1acec0629edd8586\n\n lpia architecture (Low Power Intel Architecture):\n\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.2_lpia.deb\n Size/MD5: 242014 0b9676d42353eae308b923ac2c2172d7\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.2_lpia.deb\n Size/MD5: 236570 d42595dd3d5229a7db2f4a6b3047a372\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.2_lpia.deb\n Size/MD5: 241440 3cfa67183c677cc44fc9f0354231978b\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.2_lpia.deb\n Size/MD5: 212924 83433f6847c191927c8bb5234339416a\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.2_lpia.deb\n Size/MD5: 213902 4be2d9e80eabaea30169e3fa39ebe3d8\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.2_lpia.deb\n Size/MD5: 149396 20350717c1cebdf372f0d11d09374852\n http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.2_lpia.deb\n Size/MD5: 773130 cbed31d2962a5e0c77a400434f9b7ff4\n http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.2_lpia.deb\n Size/MD5: 86764 6a9b7a0a9015044fff19ff9bf479fbc3\n http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.2_lpia.deb\n Size/MD5: 85188 2d685381871858d3c685da5a2b44f0f7\n\n powerpc architecture (Apple Macintosh G3/G4/G5):\n\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.2_powerpc.deb\n Size/MD5: 265094 41f064e2daa4ddaf422bcd5013163c11\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.2_powerpc.deb\n Size/MD5: 260042 f60b2311f40da9c254fc7583a6a4215a\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.2_powerpc.deb\n Size/MD5: 264720 80ba36d44ae08be1f5593b9d60c873e9\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.2_powerpc.deb\n Size/MD5: 212934 a35fed013193cf2d0c021baaac793a13\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.2_powerpc.deb\n Size/MD5: 213912 d6f400db5f98bb345b063b5a191735fc\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.2_powerpc.deb\n Size/MD5: 164086 36c7ab8da76606f2a1fa12328cd35123\n http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.2_powerpc.deb\n Size/MD5: 932026 9a66083f7211f75a083c20a94efebf12\n http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.2_powerpc.deb\n Size/MD5: 87516 8a913c9fd0b3f6e7c71cfb6ce6345702\n http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.2_powerpc.deb\n Size/MD5: 85794 c74337f58c4bad32e2ca1349a182696a\n\n sparc architecture (Sun SPARC/UltraSPARC):\n\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.2_sparc.deb\n Size/MD5: 250414 dd2f00b98a1089c03950010ee4feacdc\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.2_sparc.deb\n Size/MD5: 244704 9748c6a30dd03d7a94b7ee0e5cbbf37c\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.2_sparc.deb\n Size/MD5: 249756 68a0607bb1d915a1da034f3ecda6e492\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.2_sparc.deb\n Size/MD5: 212924 03ceb43c9e4494db9ce8e2375edadd5b\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.2_sparc.deb\n Size/MD5: 213900 c17c6bdc630a6229922c969f94988c32\n http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.2_sparc.deb\n Size/MD5: 153928 0109fff49b9f806f9de07f2fbac15945\n http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.2_sparc.deb\n Size/MD5: 788928 11998be7f1d0a6f1952646df23936645\n http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.2_sparc.deb\n Size/MD5: 87010 a87263816f682082b234a7b3421b3729\n http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.2_sparc.deb\n Size/MD5: 85318 a17451cf2fa5597b4bb6abb2145f2a55\n\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2009-1891"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001892"
},
{
"db": "BID",
"id": "35623"
},
{
"db": "VULMON",
"id": "CVE-2009-1891"
},
{
"db": "PACKETSTORM",
"id": "83521"
},
{
"db": "PACKETSTORM",
"id": "79108"
},
{
"db": "PACKETSTORM",
"id": "79738"
},
{
"db": "PACKETSTORM",
"id": "101257"
},
{
"db": "PACKETSTORM",
"id": "79042"
},
{
"db": "PACKETSTORM",
"id": "79283"
},
{
"db": "PACKETSTORM",
"id": "79142"
}
],
"trust": 2.61
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2009-1891",
"trust": 3.5
},
{
"db": "SECUNIA",
"id": "35793",
"trust": 2.5
},
{
"db": "SECUNIA",
"id": "35781",
"trust": 2.5
},
{
"db": "VUPEN",
"id": "ADV-2009-1841",
"trust": 2.5
},
{
"db": "OSVDB",
"id": "55782",
"trust": 2.5
},
{
"db": "SECTRACK",
"id": "1022529",
"trust": 2.5
},
{
"db": "SECUNIA",
"id": "37152",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "35865",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "37221",
"trust": 1.7
},
{
"db": "SECUNIA",
"id": "35721",
"trust": 1.7
},
{
"db": "VUPEN",
"id": "ADV-2009-3184",
"trust": 1.7
},
{
"db": "BID",
"id": "35623",
"trust": 1.2
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001892",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-200907-157",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2009-1891",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "83521",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "79108",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "79738",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "101257",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "79042",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "79283",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "79142",
"trust": 0.1
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2009-1891"
},
{
"db": "BID",
"id": "35623"
},
{
"db": "PACKETSTORM",
"id": "83521"
},
{
"db": "PACKETSTORM",
"id": "79108"
},
{
"db": "PACKETSTORM",
"id": "79738"
},
{
"db": "PACKETSTORM",
"id": "101257"
},
{
"db": "PACKETSTORM",
"id": "79042"
},
{
"db": "PACKETSTORM",
"id": "79283"
},
{
"db": "PACKETSTORM",
"id": "79142"
},
{
"db": "CNNVD",
"id": "CNNVD-200907-157"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001892"
},
{
"db": "NVD",
"id": "CVE-2009-1891"
}
]
},
"id": "VAR-200907-0693",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.17203079500000001
},
"last_update_date": "2026-04-10T22:08:43.165000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Fixed in Apache httpd 2.0.64",
"trust": 0.8,
"url": "http://httpd.apache.org/security/vulnerabilities_20.html#2.0.64"
},
{
"title": "Fixed in Apache httpd 2.2.12",
"trust": 0.8,
"url": "http://httpd.apache.org/security/vulnerabilities_22.html#2.2.12"
},
{
"title": "HT3937",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT3937"
},
{
"title": "HT3937",
"trust": 0.8,
"url": "http://support.apple.com/kb/HT3937?viewlocale=ja_JP"
},
{
"title": "httpd-2.2.3-22.2.1AXS3",
"trust": 0.8,
"url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=453"
},
{
"title": "HPUXWSATW313",
"trust": 0.8,
"url": "https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber=HPUXWSATW313"
},
{
"title": "HPSBUX02612",
"trust": 0.8,
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c02579879"
},
{
"title": "7008517",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?rs=177\u0026uid=swg27008517#61029"
},
{
"title": "PM10658",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM10658"
},
{
"title": "PK91361",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PK91361\u0026loc=en_US"
},
{
"title": "7014506",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27014506#7007"
},
{
"title": "7006876",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27006876#60239"
},
{
"title": "7014463",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27014463#7007"
},
{
"title": "4023947",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg24023947"
},
{
"title": "7007033",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27007033#60239"
},
{
"title": "7007951",
"trust": 0.8,
"url": "http://www-01.ibm.com/support/docview.wss?rs=180\u0026uid=swg27007951#61029"
},
{
"title": "1820",
"trust": 0.8,
"url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=1820"
},
{
"title": "1761",
"trust": 0.8,
"url": "http://www.miraclelinux.com/support/index.php?q=node/99\u0026errata_id=1761"
},
{
"title": "RHSA-2009:1205",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/RHSA-2009-1205.html"
},
{
"title": "RHSA-2009:1580",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/RHSA-2009-1580.html"
},
{
"title": "RHSA-2009:1156",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/RHSA-2009-1156.html"
},
{
"title": "RHSA-2009:1148",
"trust": 0.8,
"url": "https://rhn.redhat.com/errata/RHSA-2009-1148.html"
},
{
"title": "multiple_vulnerabilities_in_the_apache",
"trust": 0.8,
"url": "http://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_the_apache"
},
{
"title": "TLSA-2009-21",
"trust": 0.8,
"url": "http://www.turbolinux.co.jp/security/2009/TLSA-2009-21j.txt"
},
{
"title": "TLSA-2009-30",
"trust": 0.8,
"url": "http://www.turbolinux.co.jp/security/2009/TLSA-2009-30j.txt"
},
{
"title": "RHSA-2009:1580",
"trust": 0.8,
"url": "https://www.jp.redhat.com/support/errata/RHSA/RHSA-2009-1580J.html"
},
{
"title": "RHSA-2009:1148",
"trust": 0.8,
"url": "https://www.jp.redhat.com/support/errata/RHSA/RHSA-2009-1148J.html"
},
{
"title": "RHSA-2009:1205",
"trust": 0.8,
"url": "https://www.jp.redhat.com/support/errata/RHSA/RHSA-2009-1205J.html"
},
{
"title": "interstage_as_201103",
"trust": 0.8,
"url": "http://software.fujitsu.com/jp/security/products-fujitsu/solution/interstage_as_201103.html"
},
{
"title": "Red Hat: Important: httpd security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20091148 - Security Advisory"
},
{
"title": "Red Hat: Important: httpd security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20091155 - Security Advisory"
},
{
"title": "Ubuntu Security Notice: apache2 vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-802-1"
},
{
"title": "Debian CVElist Bug Report Logs: apache2: CVE-2009-1890 denial-of-service vulnerability",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=27a7857086782f39f384e64ef1dfc6c9"
},
{
"title": "Debian CVElist Bug Report Logs: apache2.2-common: DOS possible with mod_deflate",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=45d0900970e283827439fe57bcc6422e"
},
{
"title": "Ubuntu Security Notice: apache2 regression",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-802-2"
},
{
"title": "Debian Security Advisories: DSA-1834-1 apache2 -- denial of service",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=f2b1dcd1a5ecefb05e999469ada4023a"
},
{
"title": "Debian CVElist Bug Report Logs: CVE-2009-3094, CVE-2009-3095: mod_proxy_ftp DoS",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=a36c9e7334a243cf3d9e15331467e21c"
},
{
"title": "Symantec Security Advisories: SA61 : Director multiple Apache vulnerabilities",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories\u0026qid=508649a9a651b4fb32a5cc0f1310d652"
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/Live-Hack-CVE/CVE-2009-1891 "
},
{
"title": "ReconScan",
"trust": 0.1,
"url": "https://github.com/RoliSoft/ReconScan "
},
{
"title": "ReconScan",
"trust": 0.1,
"url": "https://github.com/GiJ03/ReconScan "
},
{
"title": "test",
"trust": 0.1,
"url": "https://github.com/issdp/test "
},
{
"title": "ReconScan",
"trust": 0.1,
"url": "https://github.com/kira1111/ReconScan "
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/SecureAxom/strike "
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/DButter/whitehat_public "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2009-1891"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001892"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-400",
"trust": 1.0
},
{
"problemtype": "CWE-399",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-001892"
},
{
"db": "NVD",
"id": "CVE-2009-1891"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 2.5,
"url": "http://www.securitytracker.com/id?1022529"
},
{
"trust": 2.5,
"url": "http://secunia.com/advisories/35781"
},
{
"trust": 2.5,
"url": "http://secunia.com/advisories/35793"
},
{
"trust": 2.5,
"url": "http://www.vupen.com/english/advisories/2009/1841"
},
{
"trust": 2.5,
"url": "http://osvdb.org/55782"
},
{
"trust": 2.0,
"url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712"
},
{
"trust": 1.8,
"url": "http://security.gentoo.org/glsa/glsa-200907-04.xml"
},
{
"trust": 1.7,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2009:149"
},
{
"trust": 1.7,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=509125"
},
{
"trust": 1.7,
"url": "https://rhn.redhat.com/errata/rhsa-2009-1148.html"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/35865"
},
{
"trust": 1.7,
"url": "http://www.debian.org/security/2009/dsa-1834"
},
{
"trust": 1.7,
"url": "http://www.redhat.com/support/errata/rhsa-2009-1156.html"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/35721"
},
{
"trust": 1.7,
"url": "http://www.ubuntu.com/usn/usn-802-1"
},
{
"trust": 1.7,
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-august/msg01363.html"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/37152"
},
{
"trust": 1.7,
"url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html"
},
{
"trust": 1.7,
"url": "http://support.apple.com/kb/ht3937"
},
{
"trust": 1.7,
"url": "http://lists.apple.com/archives/security-announce/2009/nov/msg00000.html"
},
{
"trust": 1.7,
"url": "http://www.vupen.com/english/advisories/2009/3184"
},
{
"trust": 1.7,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1pk91361"
},
{
"trust": 1.7,
"url": "http://secunia.com/advisories/37221"
},
{
"trust": 1.7,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1pk99480"
},
{
"trust": 1.7,
"url": "http://wiki.rpath.com/wiki/advisories:rpsa-2009-0142"
},
{
"trust": 1.7,
"url": "http://wiki.rpath.com/advisories:rpsa-2009-0142"
},
{
"trust": 1.7,
"url": "http://marc.info/?l=bugtraq\u0026m=129190899612998\u0026w=2"
},
{
"trust": 1.7,
"url": "http://marc.info/?l=bugtraq\u0026m=130497311408250\u0026w=2"
},
{
"trust": 1.7,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a9248"
},
{
"trust": 1.7,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a8632"
},
{
"trust": 1.7,
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a12361"
},
{
"trust": 1.7,
"url": "http://www.securityfocus.com/archive/1/507857/100/0/threaded"
},
{
"trust": 1.2,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1891"
},
{
"trust": 1.1,
"url": "http://marc.info/?l=apache-httpd-dev\u0026m=124661528519546\u0026w=2"
},
{
"trust": 1.1,
"url": "http://marc.info/?l=apache-httpd-dev\u0026m=124621326524824\u0026w=2"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3ccvs.httpd.apache.org%3e"
},
{
"trust": 0.9,
"url": "http://www.securityfocus.com/bid/35623"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-1891"
},
{
"trust": 0.7,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1891"
},
{
"trust": 0.6,
"url": "http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_the_apache"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1890"
},
{
"trust": 0.6,
"url": "httpd.apache.org%3e"
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3ccvs."
},
{
"trust": 0.6,
"url": "httpd-dev\u0026m=124621326524824\u0026w=2"
},
{
"trust": 0.6,
"url": "http://marc.info/?l=apache-"
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3ccvs."
},
{
"trust": 0.6,
"url": "httpd-dev\u0026m=124661528519546\u0026w=2"
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3ccvs."
},
{
"trust": 0.6,
"url": "https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3ccvs."
},
{
"trust": 0.4,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1890"
},
{
"trust": 0.3,
"url": "http://httpd.apache.org/"
},
{
"trust": 0.3,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1pk96157"
},
{
"trust": 0.3,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1pm10658"
},
{
"trust": 0.3,
"url": "http://svn.apache.org/viewvc?view=rev\u0026revision=791454"
},
{
"trust": 0.3,
"url": "http://support.avaya.com/css/p8/documents/100071565"
},
{
"trust": 0.3,
"url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201103e.html"
},
{
"trust": 0.3,
"url": "http://rhn.redhat.com/errata/rhsa-2009-1160.html"
},
{
"trust": 0.3,
"url": "https://kb.bluecoat.com/index?page=content\u0026id=sa61\u0026actp=list"
},
{
"trust": 0.3,
"url": "http://www.mandriva.com/security/"
},
{
"trust": 0.3,
"url": "http://www.mandriva.com/security/advisories"
},
{
"trust": 0.2,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1195"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1195"
},
{
"trust": 0.2,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-1191"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-1191"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-3095"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-3555"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/400.html"
},
{
"trust": 0.1,
"url": "https://github.com/live-hack-cve/cve-2009-1891"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2009:1148"
},
{
"trust": 0.1,
"url": "https://usn.ubuntu.com/802-1/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "http://tools.cisco.com/security/center/viewalert.x?alertid=20215"
},
{
"trust": 0.1,
"url": "http://marc.info/?l=apache-httpd-announce\u0026m=125755783724966\u0026w=2"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-2939"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-3094"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-1678"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-2939"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3095"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3555"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-1678"
},
{
"trust": 0.1,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3094"
},
{
"trust": 0.1,
"url": "http://bugs.gentoo.org."
},
{
"trust": 0.1,
"url": "http://creativecommons.org/licenses/by-sa/2.5"
},
{
"trust": 0.1,
"url": "http://security.gentoo.org/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2006-4339"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2002-0840"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-3293"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2004-0492"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2006-2937"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-3292"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2006-4343"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2006-3918"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2008-0005"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2010-0010"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2003-0542"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2006-3747"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2009-3291"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2002-0839"
},
{
"trust": 0.1,
"url": "http://h71000.www7.hp.com/openvms/products/ips/apache/csws_php.html"
},
{
"trust": 0.1,
"url": "http://h30046.www3.hp.com/subsignin.php"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2006-2940"
},
{
"trust": 0.1,
"url": "http://www.itrc.hp.com/service/cki/secbullarchive.do"
},
{
"trust": 0.1,
"url": "http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na\u0026langcode=useng\u0026jumpid=in_sc-gen__driveritrc\u0026topiccode=itrc"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2005-3357"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2005-3352"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2006-3738"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2005-2491"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2007-5000"
},
{
"trust": 0.1,
"url": "http://h71000.www7.hp.com/openvms/products/ips/apache/csws.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2007-6388"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_armel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny4.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny4.dsc"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_armel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_mips.deb"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/faq"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3-4+etch9.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_armel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-src_2.2.3-4+etch9_all.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny4_all.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-src_2.2.9-10+lenny4_all.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_armel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_armel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-perchild_2.2.3-4+etch9_all.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-doc_2.2.3-4+etch9_all.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_alpha.deb"
},
{
"trust": 0.1,
"url": "http://www.debian.org/security/"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-doc_2.2.9-10+lenny4_all.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.3-4+etch9_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.3-4+etch9_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_armel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2.dsc"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny4_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_armel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3-4+etch9.dsc"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_hppa.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.3-01-2+etch3.dsc"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.3-4+etch9_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny4_armel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.3-4+etch9_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny4_armel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_mips.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.3-4+etch9_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny4_armel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny4_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.3-4+etch9_all.deb"
},
{
"trust": 0.1,
"url": "http://packages.debian.org/\u003cpkg\u003e"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny4_armel.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny4_arm.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.3-4+etch9_ia64.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny4_s390.deb"
},
{
"trust": 0.1,
"url": "http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.3-4+etch9_alpha.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.10_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.10_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.2.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6.dsc"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.6_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.6_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.2.8-1ubuntu0.10_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.6_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.6_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.10_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.6_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.10_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.6_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.10.dsc"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.10_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.2.dsc"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.10_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.10_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.6_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.10_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.6_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.10_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.6_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.6_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-src_2.2.8-1ubuntu0.10_all.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.6_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.6_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.6_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.10_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.6_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.10_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.10_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.10_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.6_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.10_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.10_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.6_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.10_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.10_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.6_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.10_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-src_2.2.9-7ubuntu3.2_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.6_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8.orig.tar.gz"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.6_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.10_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.6_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.10_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.10_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.10_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.8-1ubuntu0.10_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.6_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9-7ubuntu3.2_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.6_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.6_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.9-7ubuntu3.2_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.10_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.11-2ubuntu2.2_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.10_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.6_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.2_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.10_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.6_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.10_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.10_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.0.55-4ubuntu2.6_all.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.6_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.10_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.10_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.6_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.6_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9-7ubuntu3.2.dsc"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.6_i386.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.10_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.6_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.2_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.10_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.10_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.10.diff.gz"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.6_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-src_2.2.11-2ubuntu2.2_all.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.2_lpia.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.6_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.6_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9-7ubuntu3.2.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.10_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.2_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.10_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.2_amd64.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.6_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.10_powerpc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.2_sparc.deb"
},
{
"trust": 0.1,
"url": "http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.10_lpia.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.6_i386.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.6.diff.gz"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.6_sparc.deb"
},
{
"trust": 0.1,
"url": "http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.2_i386.deb"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2009-1891"
},
{
"db": "BID",
"id": "35623"
},
{
"db": "PACKETSTORM",
"id": "83521"
},
{
"db": "PACKETSTORM",
"id": "79108"
},
{
"db": "PACKETSTORM",
"id": "79738"
},
{
"db": "PACKETSTORM",
"id": "101257"
},
{
"db": "PACKETSTORM",
"id": "79042"
},
{
"db": "PACKETSTORM",
"id": "79283"
},
{
"db": "PACKETSTORM",
"id": "79142"
},
{
"db": "CNNVD",
"id": "CNNVD-200907-157"
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001892"
},
{
"db": "NVD",
"id": "CVE-2009-1891"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "VULMON",
"id": "CVE-2009-1891",
"ident": null
},
{
"db": "BID",
"id": "35623",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "83521",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "79108",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "79738",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "101257",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "79042",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "79283",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "79142",
"ident": null
},
{
"db": "CNNVD",
"id": "CNNVD-200907-157",
"ident": null
},
{
"db": "JVNDB",
"id": "JVNDB-2009-001892",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2009-1891",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2009-07-10T00:00:00",
"db": "VULMON",
"id": "CVE-2009-1891",
"ident": null
},
{
"date": "2009-07-06T00:00:00",
"db": "BID",
"id": "35623",
"ident": null
},
{
"date": "2009-12-07T21:57:59",
"db": "PACKETSTORM",
"id": "83521",
"ident": null
},
{
"date": "2009-07-13T15:46:56",
"db": "PACKETSTORM",
"id": "79108",
"ident": null
},
{
"date": "2009-07-28T22:40:34",
"db": "PACKETSTORM",
"id": "79738",
"ident": null
},
{
"date": "2011-05-10T00:45:11",
"db": "PACKETSTORM",
"id": "101257",
"ident": null
},
{
"date": "2009-07-09T18:00:52",
"db": "PACKETSTORM",
"id": "79042",
"ident": null
},
{
"date": "2009-07-16T21:19:17",
"db": "PACKETSTORM",
"id": "79283",
"ident": null
},
{
"date": "2009-07-13T21:16:00",
"db": "PACKETSTORM",
"id": "79142",
"ident": null
},
{
"date": "2009-07-10T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200907-157",
"ident": null
},
{
"date": "2009-08-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-001892",
"ident": null
},
{
"date": "2009-07-10T15:30:00.187000",
"db": "NVD",
"id": "CVE-2009-1891",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2023-02-13T00:00:00",
"db": "VULMON",
"id": "CVE-2009-1891",
"ident": null
},
{
"date": "2015-05-07T17:17:00",
"db": "BID",
"id": "35623",
"ident": null
},
{
"date": "2023-02-14T00:00:00",
"db": "CNNVD",
"id": "CNNVD-200907-157",
"ident": null
},
{
"date": "2011-11-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2009-001892",
"ident": null
},
{
"date": "2025-04-09T00:30:58.490000",
"db": "NVD",
"id": "CVE-2009-1891",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "79738"
},
{
"db": "PACKETSTORM",
"id": "79042"
},
{
"db": "PACKETSTORM",
"id": "79283"
},
{
"db": "PACKETSTORM",
"id": "79142"
},
{
"db": "CNNVD",
"id": "CNNVD-200907-157"
}
],
"trust": 1.0
},
"title": {
"_id": null,
"data": "Apache httpd of mod_deflate Service disruption in modules (DoS) Vulnerabilities",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2009-001892"
}
],
"trust": 0.8
},
"type": {
"_id": null,
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-200907-157"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.