TITLE: Mandriva update for apache2 SECUNIA ADVISORY ID: SA18339 VERIFY ADVISORY: http://secunia.com/advisories/18339/ CRITICAL: Less critical IMPACT: Cross Site Scripting, DoS WHERE: >From remote OPERATING SYSTEM: Mandrakelinux 10.1 http://secunia.com/product/4198/ DESCRIPTION: Mandriva has issued an update for apache2. This fixes two vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) and to conduct cross-site scripting attacks. For more information: SA18008 SA18307 SOLUTION: Apply updated packages. Mandrakelinux 10.1: 99d7e03e08f46bb8d2c6246cccc7f03a 10.1/RPMS/apache2-2.0.50-7.6.101mdk.i586.rpm 7338a879c51aad4c89484443c2b806ce 10.1/RPMS/apache2-common-2.0.50-7.6.101mdk.i586.rpm e016511ca52a8afe34438d8262207768 10.1/RPMS/apache2-devel-2.0.50-7.6.101mdk.i586.rpm bdebdafd3768e26c0d58ad1fc6cae9ff 10.1/RPMS/apache2-manual-2.0.50-7.6.101mdk.i586.rpm b9f4c1a36d9e89f41de503b0f8428719 10.1/RPMS/apache2-mod_cache-2.0.50-7.6.101mdk.i586.rpm 7b6411056d388050ef4c98d3c1de3e24 10.1/RPMS/apache2-mod_dav-2.0.50-7.6.101mdk.i586.rpm fd87e01a054073ab1a1ef9de5bb3ac54 10.1/RPMS/apache2-mod_deflate-2.0.50-7.6.101mdk.i586.rpm ecf73bf07822403bbae9c453adad28b3 10.1/RPMS/apache2-mod_disk_cache-2.0.50-7.6.101mdk.i586.rpm 7174d7461248d61ae8294406937482f3 10.1/RPMS/apache2-mod_file_cache-2.0.50-7.6.101mdk.i586.rpm daa7a98f93d00a64bb0a7a52324471cd 10.1/RPMS/apache2-mod_ldap-2.0.50-7.6.101mdk.i586.rpm 68ee307aedbe6af498d87fe112f835dc 10.1/RPMS/apache2-mod_mem_cache-2.0.50-7.6.101mdk.i586.rpm 610525fcf03a696c50192991d0a28c9b 10.1/RPMS/apache2-mod_proxy-2.0.50-7.6.101mdk.i586.rpm 5a2d76582859bc52306c6f22725f2ab7 10.1/RPMS/apache2-mod_ssl-2.0.50-4.4.101mdk.i586.rpm 1749b95a9ad45825cb085f82144794df 10.1/RPMS/apache2-modules-2.0.50-7.6.101mdk.i586.rpm 55a3abf1039dfb0c4d547685b3605fd4 10.1/RPMS/apache2-source-2.0.50-7.6.101mdk.i586.rpm e7e0c2080af16bc3215ff67a841f6323 10.1/RPMS/apache2-worker-2.0.50-7.6.101mdk.i586.rpm 50bb5f9723f0146fe82d312f7fbeb2cf 10.1/SRPMS/apache2-2.0.50-7.6.101mdk.src.rpm 21c1f068fe82b86e3396b37f7ec96782 10.1/SRPMS/apache2-mod_ssl-2.0.50-4.4.101mdk.src.rpm Mandrakelinux 10.1/X86_64: 43085852f7b6e5a55e4220cbd6493b74 x86_64/10.1/RPMS/apache2-2.0.50-7.6.101mdk.x86_64.rpm 2715904b29d6433d25f6ea35715d5484 x86_64/10.1/RPMS/apache2-common-2.0.50-7.6.101mdk.x86_64.rpm 71828de67a3c26f4061eeebef8e6de2b x86_64/10.1/RPMS/apache2-devel-2.0.50-7.6.101mdk.x86_64.rpm d37b18f9791c65466e5fafdf0287720e x86_64/10.1/RPMS/apache2-manual-2.0.50-7.6.101mdk.x86_64.rpm 088b8334c6efef6f17a1602be41b6045 x86_64/10.1/RPMS/apache2-mod_cache-2.0.50-7.6.101mdk.x86_64.rpm 9326eca120d7ac3e71337bad1f85fef0 x86_64/10.1/RPMS/apache2-mod_dav-2.0.50-7.6.101mdk.x86_64.rpm 36818cef250fc94d074f0fc0f2c6d8c7 x86_64/10.1/RPMS/apache2-mod_deflate-2.0.50-7.6.101mdk.x86_64.rpm 63d37c81fe0b48ccd91d79e4c90dd5ec x86_64/10.1/RPMS/apache2-mod_disk_cache-2.0.50-7.6.101mdk.x86_64.rpm f7daa039d6878f063ca97468d9328fa8 x86_64/10.1/RPMS/apache2-mod_file_cache-2.0.50-7.6.101mdk.x86_64.rpm 13e394bc675d106270fe8fca27f7acbd x86_64/10.1/RPMS/apache2-mod_ldap-2.0.50-7.6.101mdk.x86_64.rpm 8b1fd1bd22e33a25be158b7e152aba60 x86_64/10.1/RPMS/apache2-mod_mem_cache-2.0.50-7.6.101mdk.x86_64.rpm f88328582773c7129bf2a341d9cb88db x86_64/10.1/RPMS/apache2-mod_proxy-2.0.50-7.6.101mdk.x86_64.rpm 62170db76a317250d37884dfd07e3f1c x86_64/10.1/RPMS/apache2-mod_ssl-2.0.50-4.4.101mdk.x86_64.rpm eeedff56c6e4f15df683f9c98f0c7e8c x86_64/10.1/RPMS/apache2-modules-2.0.50-7.6.101mdk.x86_64.rpm aedf2f9b3ab9b65889546ce8dddb7930 x86_64/10.1/RPMS/apache2-source-2.0.50-7.6.101mdk.x86_64.rpm 99a1557b76f495547ada02c17044b472 x86_64/10.1/RPMS/apache2-worker-2.0.50-7.6.101mdk.x86_64.rpm 50bb5f9723f0146fe82d312f7fbeb2cf x86_64/10.1/SRPMS/apache2-2.0.50-7.6.101mdk.src.rpm 21c1f068fe82b86e3396b37f7ec96782 x86_64/10.1/SRPMS/apache2-mod_ssl-2.0.50-4.4.101mdk.src.rpm ORIGINAL ADVISORY: http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:007 OTHER REFERENCES: SA18008: http://secunia.com/advisories/18008/ SA18307: http://secunia.com/advisories/18307/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------