---------------------------------------------------------------------- Bist Du interessiert an einem neuen Job in IT-Sicherheit? Secunia hat zwei freie Stellen als Junior und Senior Spezialist in IT- Sicherheit: http://secunia.com/secunia_vacancies/ ---------------------------------------------------------------------- TITLE: Fedora update for httpd SECUNIA ADVISORY ID: SA16746 VERIFY ADVISORY: http://secunia.com/advisories/16746/ CRITICAL: Moderately critical IMPACT: Security Bypass, DoS WHERE: >From remote OPERATING SYSTEM: Fedora Core 3 http://secunia.com/product/4222/ Fedora Core 4 http://secunia.com/product/5251/ DESCRIPTION: Fedora has issued an update for httpd. This fixes a vulnerability and a security issue, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially bypass certain security restrictions. For more information: SA16559 SA16700 SOLUTION: Apply updated packages. Fedora Core 3: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/ 05dc67efda902897af31c7e62dcc66a2 SRPMS/httpd-2.0.53-3.3.src.rpm 67407cda524517254da65caff34d1030 x86_64/httpd-2.0.53-3.3.x86_64.rpm 2924ba7fd423ec96c77b0cd0aefe2a71 x86_64/httpd-devel-2.0.53-3.3.x86_64.rpm f733310d4c8e6d444f185e055918d7cf x86_64/httpd-manual-2.0.53-3.3.x86_64.rpm c7ab61bc84334772e400d641959cd85e x86_64/mod_ssl-2.0.53-3.3.x86_64.rpm 447aae779dc5640c1923925816c50985 x86_64/httpd-suexec-2.0.53-3.3.x86_64.rpm 43192fc61302fe1b52eb6719d05f0b45 x86_64/debug/httpd-debuginfo-2.0.53-3.3.x86_64.rpm 01f2bcf97e7759e17ac711009d433bfe i386/httpd-2.0.53-3.3.i386.rpm 65e794a48057d6d3d80f887488b4c03a i386/httpd-devel-2.0.53-3.3.i386.rpm 7f237c80786870bd9f9d300a67aa23fe i386/httpd-manual-2.0.53-3.3.i386.rpm 57895adf47af7a01ddb5e79d3258a790 i386/mod_ssl-2.0.53-3.3.i386.rpm fcaa78659c375778eb357e88bd367004 i386/httpd-suexec-2.0.53-3.3.i386.rpm 55a427b5a760daee39eb972c9ca03c4d i386/debug/httpd-debuginfo-2.0.53-3.3.i386.rpm Fedora Core 4: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/ de712a893989b4a89a96f3239ffe9359 SRPMS/httpd-2.0.54-10.2.src.rpm f5c47d9a1fd604a9c9f27cb52b687134 ppc/httpd-2.0.54-10.2.ppc.rpm 3fe32aacb961746f97cb239580645542 ppc/httpd-devel-2.0.54-10.2.ppc.rpm 0231bd287c86eee34823bd5de7309840 ppc/httpd-manual-2.0.54-10.2.ppc.rpm 89fc732f2caae3ec8c4fca897a57f28c ppc/mod_ssl-2.0.54-10.2.ppc.rpm 9185b402e4ebf58c362557d08f1e1e56 ppc/debug/httpd-debuginfo-2.0.54-10.2.ppc.rpm 5597e26e50c206b6292fb6a481264074 x86_64/httpd-2.0.54-10.2.x86_64.rpm e0cdb0d7c15b7882e7f446e120e8f20e x86_64/httpd-devel-2.0.54-10.2.x86_64.rpm 26dcb24b83a0528202dfe6ca343a3909 x86_64/httpd-manual-2.0.54-10.2.x86_64.rpm 5c01b4d973491f2be019bfb526199142 x86_64/mod_ssl-2.0.54-10.2.x86_64.rpm 4284f8fe2b0c85c36a87c8cd0c05f1a4 x86_64/debug/httpd-debuginfo-2.0.54-10.2.x86_64.rpm 8e1b97f27ce4a41eb7eb01c15d8eab81 i386/httpd-2.0.54-10.2.i386.rpm 9e32079613629b690beb02e91120998b i386/httpd-devel-2.0.54-10.2.i386.rpm 04bad4ac9e45412e658d82d7af66fafc i386/httpd-manual-2.0.54-10.2.i386.rpm cbe81b8781314a53962ac1b84ebc7349 i386/mod_ssl-2.0.54-10.2.i386.rpm 7b0f8b83a6f021702135942aa6159a98 i386/debug/httpd-debuginfo-2.0.54-10.2.i386.rpm OTHER REFERENCES: SA16559: http://secunia.com/advisories/16559/ SA16700: http://secunia.com/advisories/16700/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------