Apache HTTP Server 'mod _ cache' Remote Denial of Service Vulnerability
Release date:
Updated on:
Affected Systems:
Apache Group HTTP Server 2.4.6
Description:
--------------------------------------------------------------------------------
Bugtraq id: 68863
CVE (CAN) ID: CVE-2013-4352
Apache HTTP Server is an open-source Web Server of the Apache Software Foundation. It can run in most computer operating systems. Because of its wide use of multiple platforms and security, is one of the most popular Web server software. It is fast, reliable, and can be used to compile interpreters such as Perl/Python into the server through simple API extensions.
In the mod_cache module of Apache HTTP Server 2.4.6, The cache_invalidate function of modules/cache/cache_storage.c has a security vulnerability. When cache forwarding proxy is enabled, remote HTTP servers are allowed to trigger missing host names, cause a denial of service.
<* Source: vendor
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Apache Group
------------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/cache/cache_storage.c? R1 = 1491564 & r2 = 1523235 & diff_format = h
Http://httpd.apache.org/security/vulnerabilities_24.html
Http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/cache/cache_storage.c
Apache details: click here
Apache: click here
-------------------------------------- Split line --------------------------------------
Install the LAMP \ Vsftpd \ Webmin \ phpMyAdmin service and settings in Ubuntu 13.04
Compile and install LAMP in CentOS 5.9 (Apache 2.2.44 + MySQL 5.6.10 + PHP 5.4.12)
Source code for Web server architecture in RedHat 5.4 build the LAMP environment and application PHPWind
Build a WEB Server Linux + Apache + MySQL + PHP in the LAMP source code Environment
LAMP + Xcache environment setup
-------------------------------------- Split line --------------------------------------
This article permanently updates the link address: