安全公告详情

NS-SA-2021-0159

2021-09-24 11:21:19

简介

moderate: httpd/spamassassin security update

严重级别

moderate

主题

An update for httpd/spamassassin is now available for NewStart CGSL MAIN 5.05/CGSL CORE 5.05.
NewStart Security has rated this update as having a security impact of moderate. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

httpd: The mod_session module and associated backends provide an abstract interface for storing and accessing per-user session data.
spamassassin: SpamAssassin provides you with a way to reduce if not completely eliminate Unsolicited Commercial Email (SPAM) from your incoming email. It can be invoked by a MDA such as sendmail or postfix, or can be called from a procmail script, .forward file, etc. It uses a genetic-algorithm evolved scoring system to identify messages which look spammy, then adds headers to the message so they can be filtered by the user's mail reading software. This distribution includes the spamd/spamc components which create a server that considerably speeds processing of mail. To enable spamassassin, if you are receiving mail locally, simply add this line to your ~/.procmailrc: INCLUDERC=/etc/mail/spamassassin/spamassassin-default.rc To filter spam for all users, add that line to /etc/procmailrc (creating if necessary).


Security Fix(es):
httpd: A vulnerability was discovered in Apache httpd, in mod_rewrite. Certain self-referential mod_rewrite rules could be fooled by encoded newlines, causing them to redirect to an unexpected location. An attacker could abuse this flaw in a phishing attack or as part of a client-side attack on browsers.(CVE-2019-10098)
httpd: It has been discovered that the mod_session module of Apache HTTP Server (httpd), through version 2.4.29, has an improper input validation flaw in the way it handles HTTP session headers in some configurations. A remote attacker may influence their content by using a "Session" header.(CVE-2018-1283)
httpd: A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.30 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache. The vulnerability is considered as low risk since mod_cache_socache is not widely used, mod_cache_disk is not concerned by this vulnerability.(CVE-2018-1303)
httpd: In Apache httpd 2.4.0 to 2.4.29, the expression specified in could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.(CVE-2017-15715)
httpd: A flaw was found in Apache HTTP Server (httpd) versions 2.4.0 to 2.4.41. Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirected instead to an unexpected URL within the request URL.(CVE-2020-1927)
httpd: A flaw was found in Apache's HTTP server (httpd) .The mod_proxy_ftp module may use uninitialized memory with proxying to a malicious FTP server. The highest threat from this vulnerability is to data confidentiality.(CVE-2020-1934)
httpd: bugfix
spamassassin: In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly.(CVE-2019-12420)
spamassassin: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.05.F11B5.

影响组件

  • httpd
  • spamassassin

影响产品

  • CGSL MAIN 5.05
  • CGSL CORE 5.05

更新包

{"fix":[{"product":"CGSL MAIN 5.05","pkgs":[{"binary":["mod_ldap-2.4.6-97.el7.cgslv5_5.0.2.g20c7ddf.x86_64.rpm","httpd-devel-2.4.6-97.el7.cgslv5_5.0.2.g20c7ddf.x86_64.rpm","mod_proxy_html-2.4.6-97.el7.cgslv5_5.0.2.g20c7ddf.x86_64.rpm","httpd-tools-2.4.6-97.el7.cgslv5_5.0.2.g20c7ddf.x86_64.rpm","httpd-2.4.6-97.el7.cgslv5_5.0.2.g20c7ddf.x86_64.rpm","mod_ssl-2.4.6-97.el7.cgslv5_5.0.2.g20c7ddf.x86_64.rpm","mod_session-2.4.6-97.el7.cgslv5_5.0.2.g20c7ddf.x86_64.rpm","httpd-manual-2.4.6-97.el7.cgslv5_5.0.2.g20c7ddf.noarch.rpm"],"source":"httpd-2.4.6-97.el7.cgslv5_5.0.2.g20c7ddf.src.rpm"},{"binary":["spamassassin-3.4.0-6.el7.x86_64.rpm"],"source":"spamassassin-3.4.0-6.el7.src.rpm"}]},{"product":"CGSL CORE 5.05","pkgs":[{"binary":["mod_ldap-2.4.6-97.el7.cgslv5_5.0.2.g20c7ddf.x86_64.rpm","httpd-devel-2.4.6-97.el7.cgslv5_5.0.2.g20c7ddf.x86_64.rpm","mod_proxy_html-2.4.6-97.el7.cgslv5_5.0.2.g20c7ddf.x86_64.rpm","httpd-tools-2.4.6-97.el7.cgslv5_5.0.2.g20c7ddf.x86_64.rpm","httpd-2.4.6-97.el7.cgslv5_5.0.2.g20c7ddf.x86_64.rpm","mod_ssl-2.4.6-97.el7.cgslv5_5.0.2.g20c7ddf.x86_64.rpm","mod_session-2.4.6-97.el7.cgslv5_5.0.2.g20c7ddf.x86_64.rpm","httpd-manual-2.4.6-97.el7.cgslv5_5.0.2.g20c7ddf.noarch.rpm"],"source":"httpd-2.4.6-97.el7.cgslv5_5.0.2.g20c7ddf.src.rpm"},{"binary":["spamassassin-3.4.0-6.el7.x86_64.rpm"],"source":"spamassassin-3.4.0-6.el7.src.rpm"}]}]}

CVE

参考