|
COMMAND apache cross side scripting SYSTEMS AFFECTED <= apache-1.3.22-1.0.5 <= apache-1.3.26-1.1.1 <= apache-1.3.27-20021009 PROBLEM In OpenPKG Security Advisory : http://www.openpkg.org/security.html --snip-- Joe Orton <jorton@redhat.com> discovered a cross site scripting (XSS) bug [3] in mod_ssl [1], the SSL/TLS component for the Apache webserver [2]. Like the other recent Apache XSS bugs, this only affects servers using a combination of "UseCanonicalName off" (_not_ the default in OpenPKG package of Apache) and a wildcard A record of the server in the DNS. Although this combination for HTTPS servers is even less common than with plain HTTP servers, this nevertheless could allow remote attackers to execute client-side script code as other web page visitors via the HTTP "Host" header. --snip-- [1] http://www.modssl.org/ [2] http://httpd.apache.org/ [3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0840 SOLUTION Get either : >= apache-1.3.22-1.0.6 >= apache-1.3.26-1.1.2 >= apache-1.3.27-20021023