Executive Summary
Summary | |
---|---|
Title | mod_proxy_fcgi security update |
Informations | |||
---|---|---|---|
Name | RHSA-2015:1855 | First vendor Publication | 2015-10-01 |
Vendor | RedHat | Last vendor Modification | 2015-10-01 |
Severity (Vendor) | Low | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: An updated mod_proxy_fcgi package that fixes one security issue is now available for Red Hat Ceph Storage 1.2 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Common for RHEL Server (v. 6) - x86_64 3. Description: Red Hat Ceph Storage is a massively scalable, open, software-defined storage platform that combines the most stable version of the Ceph storage system with a Ceph management platform, deployment tools, and support services. The mod_proxy_fcgi package provides a proxy module for the Apache 2.2 HTTP server. A buffer overflow flaw was found in mod_proxy_fcgi's handle_headers() function. A malicious FastCGI server that httpd is configured to connect to could send a carefully crafted response that would cause an httpd child process handling the request to crash. (CVE-2014-3583) All mod_proxy_fcgi users are advised to upgrade to this updated package, which corrects this issue. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1163555 - CVE-2014-3583 httpd: mod_proxy_fcgi handle_headers() buffer over read |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2015-1855.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 | |
Os | 6 | |
Os | 1 | |
Os | 4 |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-08-20 | IAVM : 2015-A-0199 - Multiple Vulnerabilities in Apple Mac OS X Severity : Category I - VMSKEY : V0061337 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-01-16 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201701-36.nasl - Type : ACT_GATHER_INFO |
2015-10-02 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2015-1855.nasl - Type : ACT_GATHER_INFO |
2015-09-22 | Name : The remote host is missing a security update for OS X Server. File : macosx_server_5_0_3.nasl - Type : ACT_GATHER_INFO |
2015-08-17 | Name : The remote host is missing a Mac OS X update that fixes multiple security vul... File : macosx_10_10_5.nasl - Type : ACT_GATHER_INFO |
2015-08-17 | Name : The remote host is missing a Mac OS X update that fixes multiple security vul... File : macosx_SecUpd2015-006.nasl - Type : ACT_GATHER_INFO |
2015-04-22 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2015-111-03.nasl - Type : ACT_GATHER_INFO |
2015-03-17 | Name : The remote Fedora host is missing a security update. File : fedora_2014-17195.nasl - Type : ACT_GATHER_INFO |
2015-03-11 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-2523-1.nasl - Type : ACT_GATHER_INFO |
2015-03-02 | Name : The remote Fedora host is missing a security update. File : fedora_2014-17153.nasl - Type : ACT_GATHER_INFO |
2015-02-13 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2015-483.nasl - Type : ACT_GATHER_INFO |
2015-02-02 | Name : The remote web server is affected by multiple vulnerabilities. File : apache_2_4_12.nasl - Type : ACT_GATHER_INFO |
2015-02-02 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_5804b9d4a95911e4936320cf30e32f6d.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-01-23 09:25:45 |
|
2015-10-03 13:24:30 |
|
2015-10-02 17:21:49 |
|