Moderate: Red Hat Application Stack v2.2 security and enhancement update

Related Vulnerabilities: CVE-2007-6420   CVE-2008-2364   CVE-2008-2939   CVE-2007-6420   CVE-2008-2939   CVE-2008-2364  

Synopsis

Moderate: Red Hat Application Stack v2.2 security and enhancement update

Type/Severity

Security Advisory: Moderate

Topic

Red Hat Application Stack v2.2 is now available. This update fixes several
security issues and adds various enhancements.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

[Updated 11th December 2008]
This erratum has been updated to correct a typo in the version number of
the Apache HTTP server packages mentioned in the erratum description.
The proper version of the Apache HTTP server packages shipped with this
erratum is 2.2.10. No changes have been made to the packages.

Description

The Red Hat Application Stack v2.2 is an integrated open source application
stack, that includes Red Hat Enterprise Linux 5 and JBoss Enterprise
Application Platform (EAP) 4.2.

This erratum updates the Apache HTTP Server package to version 2.2.10 which
addresses the following security issues:

A flaw was found in the mod_proxy module. An attacker who has control of
a web server to which requests are being proxied could cause a limited
denial of service due to CPU consumption and stack exhaustion. (CVE-2008-2364)

A flaw was found in the mod_proxy_ftp module. Where Apache is configured
to support ftp-over-httpd proxying, a remote attacker could perform a
cross-site scripting attack. (CVE-2008-2939)

A cross-site request forgery issue was found in the mod_proxy_balancer
module. A remote attacker could cause a denial of service if
mod_proxy_balancer is enabled and an authenticated user is targeted.
(CVE-2007-6420)

The JBoss Enterprise Application Platform (EAP) 4.2 has been updated to
version 4.2.0.CP05.

The following packages were also updated:

  • mysql to 5.0.60sp1
  • mysql-connector-odbc to 3.51.26r1127
  • perl-DBI to 1.607
  • perl-DBD-MySQL to 4.008
  • perl-DBD-Pg to 1.49
  • php-pear to 1.7.2
  • postgresql to 8.2.11
  • postgresqlclient81 to 8.1.11

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Application Stack 2 (for RHEL Server) 2 x86_64
  • Red Hat Application Stack 2 (for RHEL Server) 2 i386

Fixes

  • BZ - 471009 - CVE-2007-6420 mod_proxy_balancer CSRF
  • BZ - 451615 - CVE-2008-2364 httpd: mod_proxy_http DoS via excessive interim responses from the origin server
  • BZ - 458250 - CVE-2008-2939 httpd: mod_proxy_ftp globbing XSS

CVEs

References