Beschreibung: | Summary: The remote host is missing an update for the 'apache2' package(s) announced via the SUSE-SU-2015:0689-1 advisory.
Vulnerability Insight: The Apache2 webserver was updated to fix various issues.
The following feature was added:
* Provide support for the tunneling of web socket connections to a backend websockets server. (FATE#316880)
The following security issues have been fixed:
* CVE-2013-5704: The mod_headers module in the Apache HTTP Server 2.2.22 allowed remote attackers to bypass 'RequestHeader unset' directives by placing a header in the trailer portion of data sent with chunked transfer coding. The fix also adds a 'MergeTrailers' directive to restore legacy behavior. * CVE-2014-3581: The cache_merge_headers_out function in modules/cache/cache_util.c in the mod_cache module in the Apache HTTP Server allowed remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty HTTP Content-Type header. * CVE-2003-1418: Apache HTTP Server allowed remote attackers to obtain sensitive information via (1) the ETag header, which reveals the inode number, or (2) multipart MIME boundary, which reveals child process IDs (PID). We so far assumed that this not useful to attackers, the fix is basically just reducing potential information leaks.
The following bugs have been fixed:
* Treat the 'server unavailable' condition as a transient error with all LDAP SDKs. (bsc#904427) * Fixed a segmentation fault at startup if the certs are shared across > 1 server_rec. (bsc#907339)
Affected Software/OS: 'apache2' package(s) on SUSE Linux Enterprise Server 11 SP3, SUSE Linux Enterprise Software Development Kit 11 SP3.
Solution: Please install the updated package(s).
CVSS Score: 5.0
CVSS Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
|