Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2016.1786 apache2 security update 21 July 2016 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: apache2 Publisher: Debian Operating System: Debian GNU/Linux 8 Impact/Access: Provide Misleading Information -- Remote/Unauthenticated Unauthorised Access -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2016-5387 Reference: ESB-2016.1766 ESB-2016.1765 ESB-2016.1764 Original Bulletin: http://www.debian.org/security/2016/dsa-3623 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian Security Advisory DSA-3623-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso July 20, 2016 https://www.debian.org/security/faq - - ------------------------------------------------------------------------- Package : apache2 CVE ID : CVE-2016-5387 Scott Geary of VendHQ discovered that the Apache HTTPD server used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request. For the stable distribution (jessie), this problem has been fixed in version 2.4.10-10+deb8u5. We recommend that you upgrade your apache2 packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJXjzUzAAoJEAVMuPMTQ89EUioP+wWzh9kdX1UZM5ATmobng6zu qL1dAlsjUGf3jPG8M6PP3RSt0Sy/rDcd2L1ktM3PFXwkfrRrvTlZINcCGeUSqs2b 0L7fDZZ36ZUXJr4GC1ohWqvYShG20+aAmSdSLjyhxLPc9k7Cu4GUzIPVJuqJlw4U 66MBgEICyuhNb1NyYp3iunU71j948Fa1VbYoCeT4nA2+AkNOFHeNUwFTqzw3sUJK 7KXKrb0GVTkTt0ox/1iRLUnAouXpm8Z9t0nKsdA1kTH7hsMNGXWwOZZ1NSCstZHG RWpjW67jjFU7Q/uHvkue2Fe70MXxGmSLOHjd+uUOTDVrvvzev1P+JVZb4QbIjf/x DHsyuXtIe8GLla+7oSoAx6l9oXc40YJ+ycaE2geNKA1rLKznHaV2xwfa0trnNsK2 ffnxMR1scF6/tk46IlwypTZEADqmSYJqMOTKtWaGUyFMHc8d5Wranvz2kCkvT7o5 gIzPp7kE7ssPEmfkAg6rT0hCb8rUJm8Wy6Ju1pBH9fgw+aWCshnVUlr78z2592sx XPK9B4J5A9GCUWjq2QQMAEwWEDRt/AIA4ykvWiYBL/TVRYMjCKYr/AEXueQxw5uW rFtlkjH5hSn56zupDVB9KF9cayvdKPL3BFZjPAGybj7ZpWDS67t91k3Kn/8072QZ mh8gBTatVkMSIDyYjxn8 =pWeA - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBV5ATpYx+lLeg9Ub1AQgKrQ/+OuY/FrOeyRIf2hpXRCCsLaeqs/JYAqfu 7N9B+oELiAVoYEncLOCpMH8e54xzGlo1yunoDLEWWKBPfJ0G1kH1Fap8eixjyC3u 07Z/lmSaQ1mXeeUy84u3McFv7fXV28m7ljteu8NGKTtBSKiehg2U/V7sOjuazTv3 VTW0EtaGCEHNmAh+g2VNYkIY9PBt09TlZbSbOAHY9TGB/NbSWFScpa9QlPM7sG6G Fh0q1L3nj4sbCSOUQxMdm5qe4x3xc4Vh3ygRtkTIrOY0r0j1Zhoo4hJ9j8gnFo4O zyg6kAq1c8YrLxJpq09rGaxpRVYRtpiELanFK1+VREL3rK1IjejTwNbDv3rwym3e 7Ve7F30c8cKfZZO+bkzU2Uoz10u6yoBxJB9NouCdh6ISnxdB8cut3kXXh2IxGeez 1uSwRkBIEd64ve9EakQ+jxCzQhlxh6Q/5FpZ32VUifqWkiY+qIkI/dzlzOJ1Gr2u A+06fFqNWAeDTdWEkQkdDA6T8rDw48jmJq799lLW0vPtB/Ys9PvjqI2U9hRz4WY+ +zKbg9iO5BMQ5soZesvPpjdhUQzkuhDsXVwdiXXRQubMQBTd8Cu0IBFFbOXKAlSK 4dmu7pumXEyow71EYTRZdmURRHvV1WGwj0hy+nbt6KD1467BFQAiAnc4/fd5pS4J BfuwXyQ29AU= =oPed -----END PGP SIGNATURE-----