ALAS-2011-001

Related Vulnerabilities: CVE-2011-3192  

The Apache HTTP Server is a popular web server. A flaw was found in the way the Apache HTTP Server handled Range HTTP headers. A remote attacker could use this flaw to cause httpd to use an excessive amount of memory and CPU time via HTTP requests with a specially-crafted Range header. (CVE-2011-3192) All httpd users should upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the updated packages, the httpd daemon must be restarted for the update to take effect.

ALAS-2011-001


Amazon Linux AMI Security Advisory: ALAS-2011-1
Advisory Release Date: 2011-09-27 22:46 Pacific
Advisory Updated Date: 2014-09-14 14:25 Pacific
Severity: Medium

Issue Overview:

The Apache HTTP Server is a popular web server.

A flaw was found in the way the Apache HTTP Server handled Range HTTP headers. A remote attacker could use this flaw to cause httpd to use an excessive amount of memory and CPU time via HTTP requests with a specially-crafted Range header. (CVE-2011-3192)

All httpd users should upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the updated packages, the httpd daemon must be restarted for the update to take effect.


Affected Packages:

httpd


Issue Correction:
Run yum update httpd to update your system.

New Packages:
i686:
    httpd-devel-2.2.21-1.18.amzn1.i686
    httpd-debuginfo-2.2.21-1.18.amzn1.i686
    httpd-2.2.21-1.18.amzn1.i686
    httpd-tools-2.2.21-1.18.amzn1.i686
    mod_ssl-2.2.21-1.18.amzn1.i686

noarch:
    httpd-manual-2.2.21-1.18.amzn1.noarch

src:
    httpd-2.2.21-1.18.amzn1.src

x86_64:
    mod_ssl-2.2.21-1.18.amzn1.x86_64
    httpd-tools-2.2.21-1.18.amzn1.x86_64
    httpd-2.2.21-1.18.amzn1.x86_64
    httpd-devel-2.2.21-1.18.amzn1.x86_64
    httpd-debuginfo-2.2.21-1.18.amzn1.x86_64