USN-2299-1: Apache HTTP Server vulnerabilities

Ubuntu Security Notice USN-2299-1

23rd July, 2014

apache2 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

Several security issues were fixed in Apache HTTP Server.

Software description

  • apache2 - Apache HTTP server

Details

Marek Kroemeke discovered that the mod_proxy module incorrectly handled
certain requests. A remote attacker could use this issue to cause the
server to stop responding, leading to a denial of service. This issue only
affected Ubuntu 14.04 LTS. (CVE-2014-0117)

Giancarlo Pellegrino and Davide Balzarotti discovered that the mod_deflate
module incorrectly handled body decompression. A remote attacker could use
this issue to cause resource consumption, leading to a denial of service.
(CVE-2014-0118)

Marek Kroemeke and others discovered that the mod_status module incorrectly
handled certain requests. A remote attacker could use this issue to cause
the server to stop responding, leading to a denial of service, or possibly
execute arbitrary code. (CVE-2014-0226)

Rainer Jung discovered that the mod_cgid module incorrectly handled certain
scripts. A remote attacker could use this issue to cause the server to stop
responding, leading to a denial of service. (CVE-2014-0231)

Update instructions

The problem can be corrected by updating your system to the following package version:

Ubuntu 14.04 LTS:
apache2-bin 2.4.7-1ubuntu4.1
Ubuntu 12.04 LTS:
apache2.2-bin 2.2.22-1ubuntu1.7
Ubuntu 10.04 LTS:
apache2.2-bin 2.2.14-5ubuntu8.14

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-0117, CVE-2014-0118, CVE-2014-0226, CVE-2014-0231