www-announce mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Apache HTTP Server Project" <wr...@apache.org>
Subject [Announcement] Apache HTTP Server 2.0.65 Released
Date Wed, 10 Jul 2013 17:49:22 GMT
                       Apache HTTP Server 2.0.65 Released

   The Apache Software Foundation and the Apache HTTP Server Project are
   pleased to announce the final 2.0 release version 2.0.65 of the
   Apache HTTP Server ("Apache").  This version of Apache will be the
   last 2.0 bug and security fix release, covering many but not all
   issues addressed in the stable 2.4 and legacy 2.2 released versions:

   CVE-2013-1862 (cve.mitre.org)
     mod_rewrite: Ensure that client data written to the RewriteLog is
     escaped to prevent terminal escape sequences from entering the
     log file.

    CVE-2012-0053 (cve.mitre.org)
     Fix an issue in error responses that could expose "httpOnly"
    cookies when no custom ErrorDocument is specified for status code
    400.

    CVE-2012-0031 (cve.mitre.org)
     Fix scoreboard issue which could allow an unprivileged child
    process to cause the parent to crash at shutdown rather than
    terminate cleanly.

    CVE-2011-3368 (cve.mitre.org)
     Reject requests where the request-URI does not match the HTTP
     specification, preventing unexpected expansion of target URLs in
     some reverse proxy configurations.

    CVE-2011-3192 (cve.mitre.org)
     core: Fix handling of byte-range requests to use less memory, to
    avoid denial of service. If the sum of all ranges in a request is
    larger than the original file, ignore the ranges and send the
    complete file.

    CVE-2011-3607 (cve.mitre.org)
     Fix integer overflow in ap_pregsub() which, when the mod_setenvif
    module is enabled, could allow local users to gain privileges via
    a .htaccess file.

       NOTE: it remains possible to exhaust all memory using a carefully
       crafted .htaccess rule, which will not be addressed in 2.0;
       enabling processing of .htaccess files authored by untrusted
       users is the root of such security risks.  Upgrade to httpd
       2.2.25 or later to limit this specific risk.

   The Apache HTTP Project thanks Ramiro Molina, Norman Hippert,
   halfdog, and Context Information Security Ltd for bringing these
   issues to the attention of the project security team.

   Apache HTTP Server 2.0.65, as well as the current stable release 2.4
   and legacy release 2.2 are available for download from;

           http://httpd.apache.org/download.cgi

   Please see the CHANGES_2.0 file, linked from the above page, for a
   full list of changes. A condensed list, CHANGES_2.0.65 provides the
   complete list of changes since 2.0.64.  A summary of the security
   vulnerabilities addressed in this and earlier releases is available:

     http://httpd.apache.org/security/vulnerabilities_20.html

   This release includes the Apache Portable Runtime (APR) release
   0.9.20, and APR Utility Library (APR-util) release 0.9.19, bundled
   with the tar and zip distributions.  The APR libraries libapr and
   libaprutil (and on Win32, libiconv version 0.9.7) must all be
   updated to ensure binary compatibility and address many known
   platform bugs.

   This release is compatible with modules compiled for 2.0.42 and later
   versions.  The Apache HTTP Project developers strongly encourages all
   users to migrate to Apache stable release 2.4 or at minimum version
   the legacy release 2.2 as quickly as possible, as no further
   maintenance will be performed on this historical version 2.0.

Mime
View raw message