[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Apache 1.3.27 Released



Apache 1.3.27 Released

http://www.apache.org/dist/httpd/Announcement.html

The Apache Software Foundation and The Apache Server Project are pleased to
announce the release of version 1.3.27 of the Apache HTTP Server. This
Announcement notes the significant changes in 1.3.27 as compared to 1.3.26.
This version of Apache is principally a security and bug fix release. A
summary of the bug fixes is given at the end of this document. Of particular
note is that 1.3.27 addresses and fixes 3 security vulnerabilities.

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0839
CAN-2002-0839 (cve.mitre.org): A vulnerability exists in all versions of
Apache prior to 1.3.27 on platforms using System V shared memory based
scoreboards. This vulnerability allows an attacker who can execute under the
Apache UID to exploit the Apache shared memory scoreboard format and send a
signal to any process as root or cause a local denial of service attack. We
thank iDefense for their responsible notification and disclosure of this
issue.

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840
CAN-2002-0840 (cve.mitre.org): Apache is susceptible to a cross site
scripting vulnerability in the default 404 page of any web server hosted on
a domain that allows wildcard DNS lookups. We thank Matthew Murphy for
notification of this issue.

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0843
CAN-2002-0843 (cve.mitre.org): There were some possible overflows in ab.c
which could be exploited by a malicious server. Note that this vulnerability
is not in Apache itself, but rather one of the support programs bundled with
Apache. We thank David Wagner for the responsible notification and
disclosure of this issue.



Reply to: