==========================================================================
Ubuntu Security Notice USN-2152-1
March 24, 2014
apache2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 13.10
– Ubuntu 12.10
– Ubuntu 12.04 LTS
– Ubuntu 10.04 LTS
Summary:
Apache HTTP server could be made to crash if it received specially crafted
network traffic.
Software Description:
– apache2: Apache HTTP server
Details:
Ning Zhang & Amin Tora discovered that the mod_dav module incorrectly
handled whitespace characters in CDATA sections. A remote attacker could
use this issue to cause the server to stop responding, resulting in a
denial of service. (CVE-2013-6438)
Rainer M Canavan discovered that the mod_log_config module incorrectly
handled certain cookies. A remote attacker could use this issue to cause
the server to stop responding, resulting in a denial of service. This issue
only affected Ubuntu 12.04 LTS, Ubuntu 12.10 and Ubuntu 13.10.
(CVE-2014-0098)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 13.10:
apache2.2-bin 2.4.6-2ubuntu2.2
Ubuntu 12.10:
apache2.2-bin 2.2.22-6ubuntu2.4
Ubuntu 12.04 LTS:
apache2.2-bin 2.2.22-1ubuntu1.5
Ubuntu 10.04 LTS:
apache2.2-bin 2.2.14-5ubuntu8.13
In general, a standard system update will make all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2152-1
CVE-2013-6438, CVE-2014-0098
Package Information:
https://launchpad.net/ubuntu/+source/apache2/2.4.6-2ubuntu2.2
https://launchpad.net/ubuntu/+source/apache2/2.2.22-6ubuntu2.4
https://launchpad.net/ubuntu/+source/apache2/2.2.22-1ubuntu1.5
https://launchpad.net/ubuntu/+source/apache2/2.2.14-5ubuntu8.13
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/
iQIcBAEBCgAGBQJTMIhcAAoJEGVp2FWnRL6TNP8P/2VgEuvdU9qxyf9yZe5tblSb
aO/5Z6qQc1PwthiocZAvbSkfacWtx4afVBWi2fi7lMZdLSy5zCrbC4/tEYO6fkU/
Hv+zqB79E/aO48HsBWjnCr6Xh3uibyePEXDavcPcHAM+4BhUHN35dtHk+rjaRiI8
gEgrqZ9zzoEjXoD+NN8+SOx8GsDxsoH0EQPqTCl2sI3zs6fZiXOtfjqIf73RazAI
WvABc0okGf55zD+CtmPdPn5ZA7X2glJuwryN+j0hkIm6+xv28QtBxnKNG4RjAQVm
w4gqL2lDV//LEjucyxWWyWKIxy1rJPtvmZeaB8odoeXP/5nff9DtPNsIwhMDLXym
sjYiXzhdVRD8p6eYXz/z716axc5s3AXUsXd6iAQqLMBXzLDA0P8oQ8VqGXJrSQBi
qjThDQqHe7lu3im0Bh6lalw+SBwqlzpnnFokOQM4Zl6wDF9qIGXa3pelQWZL/kpS
NDeWTYsFVhkOPMpmmhOeX1S3cvQhEBq4okQjwMQjmxkrZoKvE/SxCUnJKIiUX8n0
YoCSuVLTe89u6mJVQaJMYMxr4kOZZ2PQIGEjJnOc0i1OejNwGGtquF6yu0Hvn1X9
8pUngGWiDsWY3LQij63WjjLjiiMJUxkgPUq9hyjJJ2y5u55vlkkwITCnI5AvUXSZ
3Qn0Nl0nB68ko0MF6noE
=KBk7
—–END PGP SIGNATURE—–
—