rPath Security Advisory: 2007-0182-1 Published: 2007-09-14 Products: rPath Linux 1 Rating: Severe Exposure Level Classification: Remote System User Deterministic Denial of Service Updated Versions: httpd=/conary.rpath.com@rpl:devel//1-devel/2.0.61-0.1-1 mod_ssl=/conary.rpath.com@rpl:devel//1-devel/2.0.61-0.1-1 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3304 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3847 https://issues.rpath.com/browse/RPL-1710 Description: Previous versions of the httpd package are vulnerable to multiple Denial of Service attacks, one of which allows a remote attacker to crash mod_proxy using a maliciously crafted HTTP request. In its default configuration, rPath Linux 1 is not vulnerable to these attacks. Note that two additional vulnerabilities fixed in httpd 2.0.61, CVE-2007-1863 and CVE-2006-5752, were already fixed in a previous update to rPath Linux. Copyright 2007 rPath, Inc. This file is distributed under the terms of the MIT License. A copy is available at http://www.rpath.com/permanent/mit-license.html