4.7 Medium
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:N/I:N/A:C
0.061 Low
EPSS
Percentile
93.5%
CentOS Errata and Security Advisory CESA-2007:0532-01
The Apache HTTP Server is a popular Web server.
The Apache HTTP Server did not verify that a process was an Apache child
process before sending it signals. A local attacker who has the ability to
run scripts on the Apache HTTP Server could manipulate the scoreboard and
cause arbitrary processes to be terminated, which could lead to a denial of
service. (CVE-2007-3304)
A flaw was found in the Apache HTTP Server mod_status module. Sites with
the server-status page publicly accessible and ExtendedStatus enabled were
vulnerable to a cross-site scripting attack. On Red Hat Enterprise Linux
the server-status page is not enabled by default and it is best practice to
not make this publicly available. (CVE-2006-5752)
Users of Apache should upgrade to these updated packages, which contain
backported patches to correct these issues. Users should restart Apache
after installing this update.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2007-June/076138.html
Affected packages:
apache
apache-devel
apache-manual
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 2 | i386 | apache | <Β 1.3.27-12.ent.c2.1 | apache-1.3.27-12.ent.c2.1.i386.rpm |
CentOS | 2 | i386 | apache-devel | <Β 1.3.27-12.ent.c2.1 | apache-devel-1.3.27-12.ent.c2.1.i386.rpm |
CentOS | 2 | i386 | apache-manual | <Β 1.3.27-12.ent.c2.1 | apache-manual-1.3.27-12.ent.c2.1.i386.rpm |