USN-3370-2: Apache HTTP Server vulnerability
1 August 2017
Apache HTTP Server could be made to crash or leak sensitive information if it received specially crafted network traffic.
Releases
Packages
- apache2 - Apache HTTP server
Details
USN-3370-1 fixed a vulnerability in Apache HTTP Server.
This update provides the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
Robert Święcki discovered that the Apache HTTP Server mod_auth_digest
module incorrectly cleared values when processing certain requests. A
remote attacker could use this issue to cause the server to crash,
resulting in a denial or service, or possibly obtain sensitive information.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3370-1: apache2-dev, apache2-suexec-pristine, apache2-mpm-event, apache2-doc, apache2-suexec-custom, apache2-mpm-prefork, apache2-data, apache2.2-bin, libapache2-mod-proxy-html, apache2-bin, apache2-mpm-worker, apache2-suexec, apache2-mpm-itk, apache2-utils, apache2, libapache2-mod-macro