Lucene search

K
redhatRedHatRHSA-2008:0004
HistoryJan 15, 2008 - 12:00 a.m.

(RHSA-2008:0004) Moderate: apache security update

2008-01-1500:00:00
access.redhat.com
16

0.843 High

EPSS

Percentile

98.5%

The Apache HTTP Server is a popular Web server.

A flaw was found in the mod_imap module. On sites where mod_imap was
enabled and an imagemap file was publicly available, a cross-site scripting
attack was possible. (CVE-2007-5000)

A flaw was found in the mod_autoindex module. On sites where directory
listings are used, and the “AddDefaultCharset” directive has been removed
from the configuration, a cross-site scripting attack was possible against
Web browsers which did not correctly derive the response character set
following the rules in RFC 2616. (CVE-2007-4465)

A flaw was found in the mod_status module. On sites where mod_status was
enabled and the status pages were publicly available, a cross-site
scripting attack was possible. (CVE-2007-6388)

A flaw was found in the mod_proxy_ftp module. On sites where mod_proxy_ftp
was enabled and a forward proxy was configured, a cross-site scripting
attack was possible against Web browsers which did not correctly derive the
response character set following the rules in RFC 2616. (CVE-2008-0005)

Users of Apache should upgrade to these updated packages, which contain
backported patches to resolve these issues. Users should restart Apache
after installing this update.