what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Ubuntu Security Notice 499-1 https://packetstormsecurity.com/files/58667/USN-499-1.txt https://packetstormsecurity.com/files/58667/USN-499-1.txt https://packetstormsecurity.com/files/58667/Ubuntu-Security-Notice-499-1.html Fri, 17 Aug 2007 06:30:14 GMT Ubuntu Security Notice 499-1 - Stefan Esser discovered that mod_status did not force a character set, which could result in browsers becoming vulnerable to XSS attacks when processing the output. If a user were tricked into viewing server status output during a crafted server request, a remote attacker could exploit this to modify the contents, or steal confidential data (such as passwords), within the same domain. By default, mod_status is disabled in Ubuntu. Niklas Edmundsson discovered that the mod_cache module could be made to crash using a specially crafted request. A remote user could use this to cause a denial of service if Apache was configured to use a threaded worker. By default, mod_cache is disabled in Ubuntu. A flaw was discovered in the signal handling of Apache. A local attacker could trick Apache into sending SIGUSR1 to other processes. The vulnerable code was only present in Ubuntu Feisty.

Related Files

No related files
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close