[Please upgrade Apache on all platforms -- Raju]

This is an RFC 1153 digest.
(1 message)
----------------------------------------------------------------------

Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
        protocol="application/pgp-signature"; boundary="6sX45UoQRIJXqkqR"
Content-Disposition: inline
Message-ID: <[EMAIL PROTECTED]>
From: tinysofa Security Team <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: TSSA-2004-012 - apache
Date: Wed, 30 Jun 2004 00:59:59 +1000


--6sX45UoQRIJXqkqR
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D
                                             _    =20
                         |_ .  _      _  _  (_  _ =20
                         |_ | | ) \/ _) (_) |  (_|=20
                                  /               =20


                       Security  Advisory  #2004-012

 Package name:      apache / httpd
 Summary:           Denial Of Service
 Advisory ID:       TSSA-2004-012
 Date:              2004-06-29
 Affected versions: tinysofa enterprise server 1.0
                    tinysofa enterprise server 1.0-U1
                    tinysofa enterprise server 1.0-U2
                    tinysofa enterprise server 2.0-pre1

 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D

 Security Fixes
 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=20

 Description
 -----------

  apache:
  * A remote exploit has been discovered in the Apache HTTP server [0]=20
    which allows an attacker to cause the server to allocate increasing
    amounts of memory until system memory is exhausted or until process
    limits are reached.

    This problem has been assigned the name CAN-2004-0493 [1] by the=20
    Common Vulnerabilities and Exposures (CVE) project.

 References
 ----------
  [0] http://httpd.apache.org/
  [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=3DCAN-2004-0493

 Recommended Action
 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

  We recommend that all systems with these packages installed be upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


 Location
 =3D=3D=3D=3D=3D=3D=3D=3D

  All tinysofa updates are available from
  <URI:http://http.tinysofa.org/pub/tinysofa/updates/>
  <URI:ftp://ftp.tinysofa.org/pub/tinysofa/updates/>


 Automatic Updates
 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.

  Users of the APT tool may use the 'apt-get upgrade' command.

 Questions?
 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

  Check out our mailing lists:
  <URI:http://www.tinysofa.org/support/>


 Verification
 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

  This advisory is signed with the tinysofa security sign key.
  This key is available from:
  <URI:http://pgp.mit.edu:11371/pks/lookup?op=3Dget&search=3D0xAEDCBB4B>

  All tinysofa packages are signed with the tinysofa stable sign key.
  This key is available from:
  <URI:http://pgp.mit.edu:11371/pks/lookup?op=3Dget&search=3D0x0F1240A2>

  The advisory is available from the tinysofa errata database at
  <URI:http://www.tinysofa.org/support/errata/>
  or directly at
  <URI:http://www.tinysofa.org/support/errata/2004/012.html>


 MD5sums Of The Packages
 =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

 [server-1.0]

  ebc6032e2b8581955df97921bd194fda  apache-2.0.49-14ts.i586.rpm
  581dfd444acf8e5d22bd1f2ce34a7213  apache-dbm-2.0.49-14ts.i586.rpm
  079c2e42a23afbe60f8f8b98b9287410  apache-devel-2.0.49-14ts.i586.rpm
  4956d084928e6f3591cf112d211496a5  apache-manual-2.0.49-14ts.i586.rpm
  e36c1e88e598907e7ec44b13eca9d64b  apr-0.9.5-14ts.i586.rpm
  acdac3d099decb442e271febc18696d9  apr-devel-0.9.5-14ts.i586.rpm
  b45a7a65fe3cc2bc435bdabb79535373  apr-util-0.9.5-14ts.i586.rpm
  5110e06e4d7bf2b24e8298cc2c0b54f4  apr-util-devel-0.9.5-14ts.i586.rpm

 [server-2.0]

  dc3bf12c0df7ea363da38382e11ed5d4  httpd-2.0.49-8ts.i386.rpm
  0cb2829c70eed23a3a839ee0e3cb755a  httpd-devel-2.0.49-8ts.i386.rpm
  6f4915a3221629c2a56b4ccc517509f4  httpd-manual-2.0.49-8ts.i386.rpm
  62df1e70370c41795e6abff6950e925b  mod_ssl-2.0.49-8ts.i386.rpm

 --
 tinysofa Security Team <security at tinysofa dot org>

--6sX45UoQRIJXqkqR
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFA4YPr6VF9/q7cu0sRAlQoAKCUOJ+K/a6Y/PjdC7ZsbMn+EZBnVgCfSwPb
HmXBYZ742SpacMnP3e61GiM=
=JlPY
-----END PGP SIGNATURE-----

--6sX45UoQRIJXqkqR--

------------------------------

End of this Digest
******************

-- 
Raj Mathur                [EMAIL PROTECTED]      http://kandalaya.org/
       GPG: 78D4 FC67 367F 40E2 0DD5  0FEF C968 D0EF CC68 D17F
                      It is the mind that moves

_______________________________________________
ilugd mailinglist -- [EMAIL PROTECTED]
http://frodo.hserus.net/mailman/listinfo/ilugd
Archives at: http://news.gmane.org/gmane.user-groups.linux.delhi 
http://www.mail-archive.com/[EMAIL PROTECTED]/

Reply via email to