mailing list archives
rPSA-2009-0154-1 httpd mod_ssl
From: rPath Update Announcements <announce-noreply () rpath com>
Date: Tue, 24 Nov 2009 18:56:52 -0500
rPath Security Advisory: 2009-0154-1
rPath Appliance Platform Linux Service 1
rPath Linux 1
Exposure Level Classification:
Indirect Deterministic Weakness
httpd=conary.rpath.com () rpl:1/2.0.63-0.9-1
mod_ssl=conary.rpath.com () rpl:1/2.0.63-0.9-1
rPath Issue Tracking System:
Previous versions of httpd are vulnerable to a man-in-the-middle attack
during TLS session renegotiation, sometimes referred to as the "Project
Mogul" issue. This vulnerability has been addressed in this update.
Additionally, two denial of service vulnerabilities and an access
restriction bypass in mod_proxy_ftp are resolved in this update.
Copyright 2009 rPath, Inc.
This file is distributed under the terms of the MIT License.
A copy is available at http://www.rpath.com/permanent/mit-license.html
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- rPSA-2009-0154-1 httpd mod_ssl rPath Update Announcements (Nov 25)