ALAS-2013-193


Amazon Linux 1 Security Advisory: ALAS-2013-193
Advisory Release Date: 2013-05-24 13:56 Pacific
Advisory Updated Date: 2014-09-15 23:06 Pacific
Severity: Medium

Issue Overview:

Cross-site scripting (XSS) flaws were found in the mod_proxy_balancer module's manager web interface. If a remote attacker could trick a user, who was logged into the manager web interface, into visiting a specially-crafted URL, it would lead to arbitrary web script execution in the context of the user's manager interface session. (CVE-2012-4558)

It was found that mod_rewrite did not filter terminal escape sequences from its log file. If mod_rewrite was configured with the RewriteLog directive, a remote attacker could use specially-crafted HTTP requests to inject terminal escape sequences into the mod_rewrite log file. If a victim viewed the log file with a terminal emulator, it could result in arbitrary command execution with the privileges of that user. (CVE-2013-1862)

Cross-site scripting (XSS) flaws were found in the mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp modules. An attacker could possibly use these flaws to perform XSS attacks if they were able to make the victim's browser generate an HTTP request with a specially-crafted Host header. (CVE-2012-3499)


Affected Packages:

httpd


Issue Correction:
Run yum update httpd to update your system.

New Packages:
i686:
    httpd-debuginfo-2.2.24-2.31.amzn1.i686
    httpd-2.2.24-2.31.amzn1.i686
    mod_ssl-2.2.24-2.31.amzn1.i686
    httpd-tools-2.2.24-2.31.amzn1.i686
    httpd-devel-2.2.24-2.31.amzn1.i686

noarch:
    httpd-manual-2.2.24-2.31.amzn1.noarch

src:
    httpd-2.2.24-2.31.amzn1.src

x86_64:
    httpd-devel-2.2.24-2.31.amzn1.x86_64
    mod_ssl-2.2.24-2.31.amzn1.x86_64
    httpd-debuginfo-2.2.24-2.31.amzn1.x86_64
    httpd-2.2.24-2.31.amzn1.x86_64
    httpd-tools-2.2.24-2.31.amzn1.x86_64