TITLE: Mandriva update for apache2 SECUNIA ADVISORY ID: SA18161 VERIFY ADVISORY: http://secunia.com/advisories/18161/ CRITICAL: Moderately critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Mandrakelinux 10.1 http://secunia.com/product/4198/ DESCRIPTION: Mandriva has issued an update for apache2. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA16559 SOLUTION: Apply updated packages. Mandrakelinux 10.1: 2bd9be4b3efe255f4db55fce501d15a8 10.1/RPMS/apache2-2.0.50-7.5.101mdk.i586.rpm cb9bdc9ef96ce17340128d43b2a00cf0 10.1/RPMS/apache2-common-2.0.50-7.5.101mdk.i586.rpm aa201695e4c76d17f9a533ad7809660d 10.1/RPMS/apache2-devel-2.0.50-7.5.101mdk.i586.rpm 6e494c490870ed813cbf5b03092a0ed5 10.1/RPMS/apache2-manual-2.0.50-7.5.101mdk.i586.rpm af3f760be31e9cdcc606a359e0994260 10.1/RPMS/apache2-mod_cache-2.0.50-7.5.101mdk.i586.rpm 6496ac5d42657d967a585dd5244a3138 10.1/RPMS/apache2-mod_dav-2.0.50-7.5.101mdk.i586.rpm f510bd2caadb07420720ac14aa9e7ba5 10.1/RPMS/apache2-mod_deflate-2.0.50-7.5.101mdk.i586.rpm 51504aa311d28f43ae72d699d56cf2d0 10.1/RPMS/apache2-mod_disk_cache-2.0.50-7.5.101mdk.i586.rpm 7acd176a42ce0f5251e8b1f380fdfe63 10.1/RPMS/apache2-mod_file_cache-2.0.50-7.5.101mdk.i586.rpm b359fc952ebdc85f7aa8536a644821b9 10.1/RPMS/apache2-mod_ldap-2.0.50-7.5.101mdk.i586.rpm 19b66959762b0b4f5a2ad27741e27d16 10.1/RPMS/apache2-mod_mem_cache-2.0.50-7.5.101mdk.i586.rpm d12b0ef4e3c8a84d5eb11a7f07d14cca 10.1/RPMS/apache2-mod_proxy-2.0.50-7.5.101mdk.i586.rpm 6705ee3928a58246748d84173c6fa4ce 10.1/RPMS/apache2-modules-2.0.50-7.5.101mdk.i586.rpm 8db8adeabe3dd1f50ff6eb583e502c5f 10.1/RPMS/apache2-source-2.0.50-7.5.101mdk.i586.rpm 00c648dff79ae63e37240c5445462a46 10.1/RPMS/apache2-worker-2.0.50-7.5.101mdk.i586.rpm 14bbad2d7310bc36ba4a70eed392916f 10.1/SRPMS/apache2-2.0.50-7.5.101mdk.src.rpm Mandrakelinux 10.1/X86_64: 1107fed88c85911bb749b6d579eb18a2 x86_64/10.1/RPMS/apache2-2.0.50-7.5.101mdk.x86_64.rpm 5ff4eb580bb7de3c3ac39ef78cc549b0 x86_64/10.1/RPMS/apache2-common-2.0.50-7.5.101mdk.x86_64.rpm fcb64e228bb9dc32fae9c12c0cf82e0a x86_64/10.1/RPMS/apache2-devel-2.0.50-7.5.101mdk.x86_64.rpm 5ee31fe2edc48dfe481e6927656fdb73 x86_64/10.1/RPMS/apache2-manual-2.0.50-7.5.101mdk.x86_64.rpm efee4460197fdce90ceba72e97b0d429 x86_64/10.1/RPMS/apache2-mod_cache-2.0.50-7.5.101mdk.x86_64.rpm 217cd580c01d18e28923dbefbd8956d1 x86_64/10.1/RPMS/apache2-mod_dav-2.0.50-7.5.101mdk.x86_64.rpm 64c018efd41b3b9265ef73a9589551b8 x86_64/10.1/RPMS/apache2-mod_deflate-2.0.50-7.5.101mdk.x86_64.rpm e4bdf02a516b061b6f783d6be5ad6484 x86_64/10.1/RPMS/apache2-mod_disk_cache-2.0.50-7.5.101mdk.x86_64.rpm eb8843b6a5da24a283e56add50fe5ff6 x86_64/10.1/RPMS/apache2-mod_file_cache-2.0.50-7.5.101mdk.x86_64.rpm a70b84f0f6e916eb3d72474fac8054c0 x86_64/10.1/RPMS/apache2-mod_ldap-2.0.50-7.5.101mdk.x86_64.rpm 723fe53862f96148b00bb9eb49eac03f x86_64/10.1/RPMS/apache2-mod_mem_cache-2.0.50-7.5.101mdk.x86_64.rpm bf6c31bd761c55ba63118aa0ed097430 x86_64/10.1/RPMS/apache2-mod_proxy-2.0.50-7.5.101mdk.x86_64.rpm 302e2e4e747f543e70f240415a1dc249 x86_64/10.1/RPMS/apache2-modules-2.0.50-7.5.101mdk.x86_64.rpm cc67b2591839741292daceb69ceebeec x86_64/10.1/RPMS/apache2-source-2.0.50-7.5.101mdk.x86_64.rpm 8d19a5c232217dc9d37a8a6c7e54af58 x86_64/10.1/RPMS/apache2-worker-2.0.50-7.5.101mdk.x86_64.rpm 14bbad2d7310bc36ba4a70eed392916f x86_64/10.1/SRPMS/apache2-2.0.50-7.5.101mdk.src.rpm ORIGINAL ADVISORY: http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:233 OTHER REFERENCES: SA16559: http://secunia.com/advisories/16559/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------