Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux SE 1.5
Astra Linux SE 1.6
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:com.altx-soft.nix:def:13835
[Rus]
Version
9
Class
patch
ALTXid
28108
Language
English
Severity
NotAvailable
Title
USN-731-1 -- apache2 vulnerabilities
Description
It was discovered that Apache did not sanitize the method specifier header from an HTTP request when it is returned in an error message, which could result in browsers becoming vulnerable to cross-site scripting attacks when processing the output. With cross-site scripting vulnerabilities, if a user were tricked into viewing server output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data , within the same domain. This issue only affected Ubuntu 6.06 LTS and 7.10. It was discovered that Apache was vulnerable to a cross-site request forgery in the mod_proxy_balancer balancer manager. If an Apache administrator were tricked into clicking a link on a specially crafted web page, an attacker could trigger commands that could modify the balancer manager configuration. This issue only affected Ubuntu 7.10 and 8.04 LTS. It was discovered that Apache had a memory leak when using mod_ssl with compression. A remote attacker could exploit this to exhaust server memory, leading to a denial of service. This issue only affected Ubuntu 7.10. It was discovered that in certain conditions, Apache did not specify a default character set when returning certain error messages containing UTF-7 encoded data, which could result in browsers becoming vulnerable to cross-site scripting attacks when processing the output. This issue only affected Ubuntu 6.06 LTS and 7.10. It was discovered that when configured as a proxy server, Apache did not limit the number of forwarded interim responses. A malicious remote server could send a large number of interim responses and cause a denial of service via memory exhaustion. It was discovered that mod_proxy_ftp did not sanitize wildcard pathnames when they are returned in directory listings, which could result in browsers becoming vulnerable to cross-site scripting attacks when processing the output
Family
unix
Platform
Ubuntu 6.06
Ubuntu 7.10
Ubuntu 8.04
Product
apache2
Reference
VENDOR: USN-731-1
VENDOR: USN-731-1
Id:
USN-731-1
Reference:
https://usn.ubuntu.com/usn/usn-731-1
CVE: CVE-2008-2939
CVE: CVE-2008-2939
Id:
CVE-2008-2939
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939
Comment
: Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CWE:
79 (Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))
References:
http://svn.apache.org/viewvc?view=rev&revision=682868 (CONFIRM)
http://svn.apache.org/viewvc?view=rev&revision=682871 (CONFIRM)
30560 (BID)
31384 (SECUNIA)
http://www.rapid7.com/advisories/R7-0033 (MISC)
31673 (SECUNIA)
VU#663763 (CERT-VN)
1020635 (SECTRACK)
PK70197 (AIXAPAR)
http://svn.apache.org/viewvc?view=rev&revision=682870 (CONFIRM)
PK70937 (AIXAPAR)
MDVSA-2008:195 (MANDRIVA)
MDVSA-2008:194 (MANDRIVA)
32685 (SECUNIA)
RHSA-2008:0967 (REDHAT)
SUSE-SR:2008:024 (SUSE)
RHSA-2008:0966 (REDHAT)
247666 (SUNALERT)
33156 (SECUNIA)
HPSBUX02401 (HP)
33797 (SECUNIA)
32838 (SECUNIA)
http://wiki.rpath.com/Advisories:rPSA-2008-0327 (CONFIRM)
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0328 (CONFIRM)
USN-731-1 (UBUNTU)
34219 (SECUNIA)
APPLE-SA-2009-05-12 (APPLE)
http://support.apple.com/kb/HT3549 (CONFIRM)
TA09-133A (CERT)
35074 (SECUNIA)
ADV-2009-1297 (VUPEN)
MDVSA-2009:124 (MANDRIVA)
HPSBUX02465 (HP)
ADV-2009-0320 (VUPEN)
ADV-2008-2315 (VUPEN)
ADV-2008-2461 (VUPEN)
apache-modproxyftp-xss(44223) (XF)
oval:org.mitre.oval:def:7716 (OVAL)
oval:org.mitre.oval:def:11316 (OVAL)
20081122 rPSA-2008-0328-1 httpd mod_ssl (BUGTRAQ)
20081122 rPSA-2008-0327-1 httpd mod_ssl (BUGTRAQ)
20080806 Apache HTTP Server mod_proxy_ftp Wildcard Characters Cross-Site Scripting (BUGTRAQ)
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E (MISC)
CVE: CVE-2008-2364
CVE: CVE-2008-2364
Id:
CVE-2008-2364
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364
Comment
: The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE:
770 (Allocation of Resources Without Limits or Throttling)
References:
http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=666154&r2=666153&pathrev=666154 (CONFIRM)
29653 (BID)
30621 (SECUNIA)
FEDORA-2008-6314 (FEDORA)
31416 (SECUNIA)
31404 (SECUNIA)
31026 (SECUNIA)
FEDORA-2008-6393 (FEDORA)
GLSA-200807-06 (GENTOO)
1020267 (SECTRACK)
31651 (SECUNIA)
HPSBUX02365 (HP)
http://www-01.ibm.com/support/docview.wss?uid=swg27008517 (CONFIRM)
31904 (SECUNIA)
MDVSA-2008:195 (MANDRIVA)
PK67579 (AIXAPAR)
APPLE-SA-2008-10-09 (APPLE)
31681 (BID)
http://support.apple.com/kb/HT3216 (CONFIRM)
32222 (SECUNIA)
32685 (SECUNIA)
RHSA-2008:0967 (REDHAT)
RHSA-2008:0966 (REDHAT)
MDVSA-2008:237 (MANDRIVA)
HPSBUX02401 (HP)
33156 (SECUNIA)
247666 (SUNALERT)
33797 (SECUNIA)
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0328 (CONFIRM)
32838 (SECUNIA)
SUSE-SR:2009:006 (SUSE)
USN-731-1 (UBUNTU)
34259 (SECUNIA)
34219 (SECUNIA)
34418 (SECUNIA)
SUSE-SR:2009:007 (SUSE)
HPSBUX02465 (HP)
ADV-2008-2780 (VUPEN)
ADV-2009-0320 (VUPEN)
ADV-2008-1798 (VUPEN)
http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html (CONFIRM)
apache-modproxy-module-dos(42987) (XF)
oval:org.mitre.oval:def:9577 (OVAL)
oval:org.mitre.oval:def:6084 (OVAL)
oval:org.mitre.oval:def:11713 (OVAL)
20081122 rPSA-2008-0328-1 httpd mod_ssl (BUGTRAQ)
20080729 rPSA-2008-0236-1 httpd mod_ssl (BUGTRAQ)
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/r8c9983f1172a3415f915ddb7e14de632d2d0c326eb1285755a024165%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/r7dd6be4dc38148704f2edafb44a8712abaa3a2be120d6c3314d55919%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/r84d043c2115176958562133d96d851495d712aa49da155d81f6733be%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E (MISC)
https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E (MISC)
CVE: CVE-2008-2168
CVE: CVE-2008-2168
Id:
CVE-2008-2168
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2168
Comment
: Cross-site scripting (XSS) vulnerability in Apache 2.2.6 and earlier allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded URLs that are not properly handled when displaying the 403 Forbidden error page.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CWE:
79 (Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))
References:
HPSBUX02365 (HP)
HPSBUX02431 (HP)
HPSBUX02465 (HP)
31651 (SECUNIA)
34219 (SECUNIA)
35650 (SECUNIA)
3889 (SREASON)
20080508 Apache Server HTML Injection and UTF-7 XSS Vulnerability (BUGTRAQ)
20080510 Re: Apache Server HTML Injection and UTF-7 XSS Vulnerability (BUGTRAQ)
20080510 Re: Re: Apache Server HTML Injection and UTF-7 XSS Vulnerability (BUGTRAQ)
20080512 Re: Re: Re: Apache Server HTML Injection and UTF-7 XSS Vulnerability (BUGTRAQ)
29112 (BID)
USN-731-1 (UBUNTU)
apache-403-xss(42303) (XF)
oval:org.mitre.oval:def:5143 (OVAL)
CVE: CVE-2008-1678
CVE: CVE-2008-1678
Id:
CVE-2008-1678
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1678
Comment
: Memory leak in the zlib_stateful_init function in crypto/comp/c_zlib.c in libssl in OpenSSL 0.9.8f through 0.9.8h allows remote attackers to cause a denial of service (memory consumption) via multiple calls, as demonstrated by initial SSL client handshakes to the Apache HTTP Server mod_ssl that specify a compression algorithm.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE:
399 (Resource Management Errors)
References:
[openssl-dev] 20080512 possible memory leak in zlib compression (MLIST)
http://bugs.gentoo.org/show_bug.cgi?id=222643 (CONFIRM)
http://svn.apache.org/viewvc?view=rev&revision=654119 (CONFIRM)
https://bugs.edge.launchpad.net/bugs/186339 (CONFIRM)
https://bugs.edge.launchpad.net/bugs/224945 (CONFIRM)
https://issues.apache.org/bugzilla/show_bug.cgi?id=44975 (CONFIRM)
GLSA-200807-06 (GENTOO)
31026 (SECUNIA)
FEDORA-2008-6393 (FEDORA)
31416 (SECUNIA)
APPLE-SA-2008-10-09 (APPLE)
31681 (BID)
32222 (SECUNIA)
http://support.apple.com/kb/HT3216 (CONFIRM)
31692 (BID)
SUSE-SR:2008:024 (SUSE)
3981 (SREASON)
USN-731-1 (UBUNTU)
34219 (SECUNIA)
https://bugzilla.redhat.com/show_bug.cgi?id=447268 (CONFIRM)
35264 (SECUNIA)
RHSA-2009:1075 (REDHAT)
MDVSA-2009:124 (MANDRIVA)
38761 (SECUNIA)
SSA:2010-060-02 (SLACKWARE)
https://kb.bluecoat.com/index?page=content&id=SA50 (CONFIRM)
42733 (SECUNIA)
42724 (SECUNIA)
ADV-2008-2780 (VUPEN)
44183 (SECUNIA)
openssl-libssl-dos(43948) (XF)
oval:org.mitre.oval:def:9754 (OVAL)
CVE: CVE-2007-6420
CVE: CVE-2007-6420
Id:
CVE-2007-6420
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6420
Comment
: Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CWE:
352 ()
References:
27236 (BID)
3523 (SREASON)
GLSA-200807-06 (GENTOO)
31026 (SECUNIA)
31681 (BID)
APPLE-SA-2008-10-09 (APPLE)
http://support.apple.com/kb/HT3216 (CONFIRM)
32222 (SECUNIA)
SUSE-SR:2008:024 (SUSE)
RHSA-2008:0966 (REDHAT)
HPSBUX02401 (HP)
33797 (SECUNIA)
USN-731-1 (UBUNTU)
34219 (SECUNIA)
ADV-2009-0320 (VUPEN)
ADV-2008-2780 (VUPEN)
oval:org.mitre.oval:def:8371 (OVAL)
20080729 rPSA-2008-0236-1 httpd mod_ssl (BUGTRAQ)
20080110 SecurityReason - Apache2 CSRF, XSS, Memory Corruption and Denial of Service Vulnerability (BUGTRAQ)
[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html ()
[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html ()
[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html ()
[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html ()
[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/ ()
[httpd-cvs] 20210330 svn commit: r1888194 [5/13] - /httpd/site/trunk/content/security/json/ ()
[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html ()
[httpd-cvs] 20210330 svn commit: r1073139 [5/13] - in /websites/staging/httpd/trunk/content: ./ security/json/ ()
[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html ()
[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/ ()
[httpd-cvs] 20210330 svn commit: r1073149 [6/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/ ()
[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html ()
CVE: CVE-2007-6203
CVE: CVE-2007-6203
Id:
CVE-2007-6203
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6203
Comment
: Apache HTTP Server 2.0.x and 2.2.x does not sanitize the HTTP Method specifier header from an HTTP request when it is reflected back in a "413 Request Entity Too Large" error message, which might allow cross-site scripting (XSS) style attacks using web client components that can send arbitrary headers in requests, as demonstrated via an HTTP request containing an invalid Content-length value, a similar issue to CVE-2006-3918.
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:N/I:P/A:N
CWE:
79 (Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))
References:
http://docs.info.apple.com/article.html?artnum=307562 (CONFIRM)
APPLE-SA-2008-03-18 (APPLE)
SUSE-SA:2008:021 (SUSE)
HPSBUX02465 (HP)
HPSBUX02612 (HP)
http://procheckup.com/Vulnerability_PR07-37.php (MISC)
27906 (SECUNIA)
28196 (SECUNIA)
29348 (SECUNIA)
29420 (SECUNIA)
29640 (SECUNIA)
30356 (SECUNIA)
30732 (SECUNIA)
33105 (SECUNIA)
34219 (SECUNIA)
GLSA-200803-19 (GENTOO)
3411 (SREASON)
PK57952 (AIXAPAR)
PK65782 (AIXAPAR)
http://www.fujitsu.com/global/support/software/security/products-f/interstage-200807e.html (CONFIRM)
20071130 PR07-37: XSS on Apache HTTP Server 413 error pages via malformed HTTP method (BUGTRAQ)
26663 (BID)
1019030 (SECTRACK)
USN-731-1 (UBUNTU)
ADV-2007-4060 (VUPEN)
ADV-2007-4301 (VUPEN)
ADV-2008-0924 (VUPEN)
ADV-2008-1623 (VUPEN)
ADV-2008-1875 (VUPEN)
apache-413error-xss(38800) (XF)
oval:org.mitre.oval:def:12166 (OVAL)
Content available only for registered users!
ovaldb@altx-soft.com