Ubuntu USN-731-1 (apache2)

Published: 2009-03-13 18:24:56
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Summary:
The remote host is missing an update to apache2 announced via advisory USN-731-1. For details, please visit the referenced security advisories.

Recommendations:
The problem can be corrected by upgrading your system to the following Linux Distribution Package versions: Ubuntu 6.06 LTS: apache2-common 2.0.55-4ubuntu2.4 apache2-mpm-perchild 2.0.55-4ubuntu2.4 apache2-mpm-prefork 2.0.55-4ubuntu2.4 apache2-mpm-worker 2.0.55-4ubuntu2.4 Ubuntu 7.10: apache2-mpm-event 2.2.4-3ubuntu0.2 apache2-mpm-perchild 2.2.4-3ubuntu0.2 apache2-mpm-prefork 2.2.4-3ubuntu0.2 apache2-mpm-worker 2.2.4-3ubuntu0.2 apache2.2-common 2.2.4-3ubuntu0.2 Ubuntu 8.04 LTS: apache2-mpm-event 2.2.8-1ubuntu0.4 apache2-mpm-perchild 2.2.8-1ubuntu0.4 apache2-mpm-prefork 2.2.8-1ubuntu0.4 apache2-mpm-worker 2.2.8-1ubuntu0.4 apache2.2-common 2.2.8-1ubuntu0.4 In general, a standard system upgrade is sufficient to effect the necessary changes. https://secure1.securityspace.com/smysecure/catid.html?in=USN-731-1

Detection Type:
Linux Distribution Package

Solution Type:
Vendor Patch

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2007-6203
https://nvd.nist.gov/vuln/detail/CVE-2007-6420
https://nvd.nist.gov/vuln/detail/CVE-2008-1678
https://nvd.nist.gov/vuln/detail/CVE-2008-2168
https://nvd.nist.gov/vuln/detail/CVE-2008-2364
https://nvd.nist.gov/vuln/detail/CVE-2008-2939
https://nvd.nist.gov/vuln/detail/CVE-2009-0854
https://nvd.nist.gov/vuln/detail/CVE-2009-0675
https://nvd.nist.gov/vuln/detail/CVE-2009-0676
https://nvd.nist.gov/vuln/detail/CVE-2009-0759
https://nvd.nist.gov/vuln/detail/CVE-2009-0660
https://nvd.nist.gov/vuln/detail/CVE-2008-2086
https://nvd.nist.gov/vuln/detail/CVE-2008-5339
https://nvd.nist.gov/vuln/detail/CVE-2008-5340
https://nvd.nist.gov/vuln/detail/CVE-2008-5341
https://nvd.nist.gov/vuln/detail/CVE-2008-5342
https://nvd.nist.gov/vuln/detail/CVE-2008-5343
https://nvd.nist.gov/vuln/detail/CVE-2008-5344
https://nvd.nist.gov/vuln/detail/CVE-2008-5345
https://nvd.nist.gov/vuln/detail/CVE-2008-5347
https://nvd.nist.gov/vuln/detail/CVE-2008-5348
https://nvd.nist.gov/vuln/detail/CVE-2008-5350
https://nvd.nist.gov/vuln/detail/CVE-2008-5351
https://nvd.nist.gov/vuln/detail/CVE-2008-5353
https://nvd.nist.gov/vuln/detail/CVE-2008-5354
https://nvd.nist.gov/vuln/detail/CVE-2008-5356
https://nvd.nist.gov/vuln/detail/CVE-2008-5357
https://nvd.nist.gov/vuln/detail/CVE-2008-5358
https://nvd.nist.gov/vuln/detail/CVE-2008-5359
https://nvd.nist.gov/vuln/detail/CVE-2008-5360
https://nvd.nist.gov/vuln/detail/CVE-2009-0712
https://nvd.nist.gov/vuln/detail/CVE-2009-0713
https://nvd.nist.gov/vuln/detail/CVE-2008-4546
https://nvd.nist.gov/vuln/detail/CVE-2009-0037
https://nvd.nist.gov/vuln/detail/CVE-2009-0632
https://nvd.nist.gov/vuln/detail/CVE-2008-1922
https://nvd.nist.gov/vuln/detail/CVE-2009-0478

References:

http://www.ubuntu.com/usn/usn-731-1/

Search
Severity
High
CVSS Score
10.0

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.