Vulnerabilità: CVE-2007-3847

Il codice di gestione data in modules / proxy / proxy_util.c (mod_proxy) in Apache 2.3.0, quando si utilizza un MPM filettato, consente server di origine remoti di provocare una negazione di servizio (cache avanti arresto processo proxy) tramite header data predisposto grilletto un buffer over-lettura.


http://www-1.ibm.com/support/docview.wss?uid=swg1PK50469
http://www-1.ibm.com/support/docview.wss?uid=swg1PK52702
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
http://lists.apple.com/archives/security-announce/2008//May/msg00001.html
http://www.securityfocus.com/bid/25489
http://www.securityfocus.com/archive/1/505990/100/0/threaded
http://www.us-cert.gov/cas/techalerts/TA08-150A.html
http://bugs.gentoo.org/show_bug.cgi?id=186219
http://docs.info.apple.com/article.html?artnum=307562
http://httpd.apache.org/security/vulnerabilities_20.html
http://httpd.apache.org/security/vulnerabilities_22.html
http://support.avaya.com/elmodocs2/security/ASA-2007-500.htm
http://www-1.ibm.com/support/docview.wss?rs=180&uid=swg27007951
http://www.fujitsu.com/global/support/software/security/products-f/interstage-200802e.html
http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
https://issues.rpath.com/browse/RPL-1710
http://www.redhat.com/archives/fedora-package-announce/2007-September/msg00320.html
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00353.html
http://security.gentoo.org/glsa/glsa-200711-06.xml
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01182588
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01182588
http://www.mandriva.com/security/advisories?name=MDKSA-2007:235
http://marc.info/?l=apache-cvs&m=118592992309395&w=2
http://marc.info/?l=apache-httpd-dev&m=118595556504202&w=2
http://marc.info/?l=apache-httpd-dev&m=118595953217856&w=2
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
http://lists.vmware.com/pipermail/security-announce/2009/000062.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10525
http://www.redhat.com/support/errata/RHSA-2007-0746.html
http://www.redhat.com/support/errata/RHSA-2007-0747.html
http://www.redhat.com/support/errata/RHSA-2007-0911.html
http://www.redhat.com/support/errata/RHSA-2008-0005.html
http://www.securitytracker.com/id?1018633
http://secunia.com/advisories/26636
http://secunia.com/advisories/26722
http://secunia.com/advisories/26790
http://secunia.com/advisories/26842
http://secunia.com/advisories/26952
http://secunia.com/advisories/26993
http://secunia.com/advisories/27209
http://secunia.com/advisories/27563
http://secunia.com/advisories/27593
http://secunia.com/advisories/27732
http://secunia.com/advisories/27882
http://secunia.com/advisories/27971
http://secunia.com/advisories/28467
http://secunia.com/advisories/28606
http://secunia.com/advisories/28749
http://secunia.com/advisories/28922
http://secunia.com/advisories/29420
http://secunia.com/advisories/30430
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.595748
http://www.novell.com/linux/security/advisories/2007_61_apache2.html
http://www.ubuntu.com/usn/usn-575-1
http://www.vupen.com/english/advisories/2007/3020
http://www.vupen.com/english/advisories/2007/3095
http://www.vupen.com/english/advisories/2007/3283
http://www.vupen.com/english/advisories/2007/3494
http://www.vupen.com/english/advisories/2007/3955
http://www.vupen.com/english/advisories/2008/0233
http://www.vupen.com/english/advisories/2008/0924/references
http://www.vupen.com/english/advisories/2008/1697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3847


E' possibile lasciare un commento come utenti registrati al sito, accedendo tramite social, account wordpress oppure come utenti anonimi. Nel caso in cui si desideri lasciare un commento come utenti anonimi si verrà avvisati via email di un'eventuale risposta solo se si inserisce l'indirizzo email (facoltativo). L'inserimento di qualsiasi dato nei campi dei commenti è totalmente facoltativo. Chiunque decida di inserire un qualsiasi dato accetta il trattamento di questi ultimi per i fini inerenti al servizio ovvero la risposta al commento e le comunicazioni strettamente necessarie.


Rispondi