CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
EPSS
Percentile
99.9%
Issue Overview:
It was discovered that the Apache HTTP Server did not properly validate the request URI for proxied requests. In certain configurations, if a reverse proxy used the ProxyPassMatch directive, or if it used the RewriteRule directive with the proxy flag, a remote attacker could make the proxy connect to an arbitrary server, possibly disclosing sensitive information from internal web servers not directly accessible to the attacker. (CVE-2011-3368)
It was discovered that mod_proxy_ajp incorrectly returned an “Internal Server Error” response when processing certain malformed HTTP requests, which caused the back-end server to be marked as failed in configurations where mod_proxy was used in load balancer mode. A remote attacker could cause mod_proxy to not send requests to back-end AJP (Apache JServ Protocol) servers for the retry timeout period or until all back-end servers were marked as failed. (CVE-2011-3348)
Affected Packages:
httpd
Issue Correction:
Run yum update httpd to update your system.
New Packages:
i686:
httpd-devel-2.2.21-1.19.amzn1.i686
httpd-tools-2.2.21-1.19.amzn1.i686
httpd-2.2.21-1.19.amzn1.i686
mod_ssl-2.2.21-1.19.amzn1.i686
httpd-debuginfo-2.2.21-1.19.amzn1.i686
noarch:
httpd-manual-2.2.21-1.19.amzn1.noarch
src:
httpd-2.2.21-1.19.amzn1.src
x86_64:
mod_ssl-2.2.21-1.19.amzn1.x86_64
httpd-debuginfo-2.2.21-1.19.amzn1.x86_64
httpd-tools-2.2.21-1.19.amzn1.x86_64
httpd-devel-2.2.21-1.19.amzn1.x86_64
httpd-2.2.21-1.19.amzn1.x86_64
Red Hat: CVE-2011-3348, CVE-2011-3368
Mitre: CVE-2011-3348, CVE-2011-3368
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | httpd-devel | < 2.2.21-1.19.amzn1 | httpd-devel-2.2.21-1.19.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | httpd-tools | < 2.2.21-1.19.amzn1 | httpd-tools-2.2.21-1.19.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | httpd | < 2.2.21-1.19.amzn1 | httpd-2.2.21-1.19.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | mod_ssl | < 2.2.21-1.19.amzn1 | mod_ssl-2.2.21-1.19.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | httpd-debuginfo | < 2.2.21-1.19.amzn1 | httpd-debuginfo-2.2.21-1.19.amzn1.i686.rpm |
Amazon Linux | 1 | noarch | httpd-manual | < 2.2.21-1.19.amzn1 | httpd-manual-2.2.21-1.19.amzn1.noarch.rpm |
Amazon Linux | 1 | x86_64 | mod_ssl | < 2.2.21-1.19.amzn1 | mod_ssl-2.2.21-1.19.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | httpd-debuginfo | < 2.2.21-1.19.amzn1 | httpd-debuginfo-2.2.21-1.19.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | httpd-tools | < 2.2.21-1.19.amzn1 | httpd-tools-2.2.21-1.19.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | httpd-devel | < 2.2.21-1.19.amzn1 | httpd-devel-2.2.21-1.19.amzn1.x86_64.rpm |