5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.006 Low
EPSS
Percentile
79.0%
CentOS Errata and Security Advisory CESA-2007:0486-01
Mod_perl incorporates a Perl interpreter into the Apache web server,
so that the Apache HTTP server can directly execute Perl code.
The Apache::PerlRun module was found to not properly escape PATH_INFO
before being used in a regular expression. If a server is configured to
use Apache::PerlRun, an attacker could request a carefully crafted URI
causing resource consumption, which could lead to a denial of service
(CVE-2007-1349).
Users of mod_perl should update to these erratum packages which contain a
backported fix to correct this issue.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2007-June/076133.html
Affected packages:
mod_perl
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 2 | i386 | mod_perl | < 1.26-8.el2 | mod_perl-1.26-8.el2.i386.rpm |