安全公告详情

NS-SA-2022-0021

2022-05-08 18:45:29

简介

important: httpd/freerdp security update

严重级别

important

主题

An update for httpd/freerdp is now available for NewStart CGSL MAIN 5.04/CGSL CORE 5.04.
NewStart Security has rated this update as having a security impact of important. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

httpd: The httpd-devel package contains the APXS binary and other files that you need to build Dynamic Shared Objects (DSOs) for the Apache HTTP Server. If you are installing the Apache HTTP server and you want to be able to compile or develop additional modules for Apache, you need to install this package.
freerdp: WinPR provides API compatibility for applications targeting non-Windows environments. When on Windows, the original native API is being used instead of the equivalent WinPR implementation, without having to modify the code using it.


Security Fix(es):
httpd: An out-of-bounds write in function ap_escape_quotes of httpd allows an unauthenticated remote attacker to crash the server or potentially execute code on the system with the privileges of the httpd user, by providing malicious input to the function.(CVE-2021-39275)
httpd: A heap overflow flaw was found In Apache httpd mod_session. The highest threat from this vulnerability is to system availability.(CVE-2021-26691)
httpd: A NULL pointer dereference in httpd allows an unauthenticated remote attacker to crash httpd by providing malformed HTTP requests. The highest threat from this vulnerability is to system availability.(CVE-2021-34798)
httpd: A buffer overflow flaw in httpd's lua module could allow an out-of-bounds write. An attacker who is able to submit a crafted request to an httpd instance that is using the lua module may be able to cause an impact to confidentiality, integrity, and/or availability.(CVE-2021-44790)
httpd: bugfix
freerdp: A flaw was found in the FreeRDP client when it fails to validate input data when using gateway connections. This flaw could allow a malicious gateway to send a specially crafted input to a client leading to an out of bounds write in client memory. The highest threat from this flaw is that it could allow arbitrary code to be executed on the target system.(CVE-2021-41159)
freerdp: A flaw was found in the FreeRDP client where it fails to validate input data when using connections with GDI or SurfaceCommands. This flaw could allow a malicious server sending graphics updates to a client to cause an out of bounds write in client memory using a specially crafted input. The highest threat from this flaw is that it could allow arbitrary code to be executed on the target system.(CVE-2021-41160)
freerdp: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F41B4.

影响组件

  • httpd
  • freerdp

影响产品

  • CGSL MAIN 5.04
  • CGSL CORE 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["httpd-tools-2.4.6-97.el7_9.4.x86_64.rpm","mod_ldap-2.4.6-97.el7_9.4.x86_64.rpm","httpd-devel-2.4.6-97.el7_9.4.x86_64.rpm","mod_session-2.4.6-97.el7_9.4.x86_64.rpm","mod_proxy_html-2.4.6-97.el7_9.4.x86_64.rpm","mod_ssl-2.4.6-97.el7_9.4.x86_64.rpm","httpd-manual-2.4.6-97.el7_9.4.noarch.rpm","httpd-debuginfo-2.4.6-97.el7_9.4.x86_64.rpm","httpd-2.4.6-97.el7_9.4.x86_64.rpm"],"source":"httpd-2.4.6-97.el7_9.4.src.rpm"},{"binary":["freerdp-debuginfo-2.1.1-5.el7_9.x86_64.rpm","freerdp-libs-2.1.1-5.el7_9.x86_64.rpm","freerdp-devel-2.1.1-5.el7_9.x86_64.rpm","libwinpr-devel-2.1.1-5.el7_9.x86_64.rpm","libwinpr-2.1.1-5.el7_9.x86_64.rpm","freerdp-2.1.1-5.el7_9.x86_64.rpm"],"source":"freerdp-2.1.1-5.el7_9.src.rpm"}]},{"product":"CGSL CORE 5.04","pkgs":[{"binary":["httpd-tools-2.4.6-97.el7_9.4.x86_64.rpm","mod_ldap-2.4.6-97.el7_9.4.x86_64.rpm","httpd-devel-2.4.6-97.el7_9.4.x86_64.rpm","mod_session-2.4.6-97.el7_9.4.x86_64.rpm","mod_proxy_html-2.4.6-97.el7_9.4.x86_64.rpm","mod_ssl-2.4.6-97.el7_9.4.x86_64.rpm","httpd-manual-2.4.6-97.el7_9.4.noarch.rpm","httpd-debuginfo-2.4.6-97.el7_9.4.x86_64.rpm","httpd-2.4.6-97.el7_9.4.x86_64.rpm"],"source":"httpd-2.4.6-97.el7_9.4.src.rpm"},{"binary":["freerdp-debuginfo-2.1.1-5.el7_9.x86_64.rpm","freerdp-libs-2.1.1-5.el7_9.x86_64.rpm","freerdp-devel-2.1.1-5.el7_9.x86_64.rpm","libwinpr-devel-2.1.1-5.el7_9.x86_64.rpm","libwinpr-2.1.1-5.el7_9.x86_64.rpm","freerdp-2.1.1-5.el7_9.x86_64.rpm"],"source":"freerdp-2.1.1-5.el7_9.src.rpm"}]}]}

CVE

参考