vuln-list-alt/oval/c9f2/ALT-PU-2021-3060/definitions.json
2024-12-12 21:07:30 +00:00

420 lines
20 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20213060",
"Version": "oval:org.altlinux.errata:def:20213060",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-3060: package `apache2` update to version 2.4.51-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-3060",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-3060",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-04216",
"RefURL": "https://bdu.fstec.ru/vul/2021-04216",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04820",
"RefURL": "https://bdu.fstec.ru/vul/2021-04820",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04902",
"RefURL": "https://bdu.fstec.ru/vul/2021-04902",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04903",
"RefURL": "https://bdu.fstec.ru/vul/2021-04903",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04904",
"RefURL": "https://bdu.fstec.ru/vul/2021-04904",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05873",
"RefURL": "https://bdu.fstec.ru/vul/2021-05873",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06099",
"RefURL": "https://bdu.fstec.ru/vul/2021-06099",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00203",
"RefURL": "https://bdu.fstec.ru/vul/2022-00203",
"Source": "BDU"
},
{
"RefID": "CVE-2021-33193",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-33193",
"Source": "CVE"
},
{
"RefID": "CVE-2021-34798",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-34798",
"Source": "CVE"
},
{
"RefID": "CVE-2021-36160",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-36160",
"Source": "CVE"
},
{
"RefID": "CVE-2021-39275",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-39275",
"Source": "CVE"
},
{
"RefID": "CVE-2021-40438",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
"Source": "CVE"
},
{
"RefID": "CVE-2021-41524",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-41524",
"Source": "CVE"
},
{
"RefID": "CVE-2021-41773",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-41773",
"Source": "CVE"
},
{
"RefID": "CVE-2021-42013",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-42013",
"Source": "CVE"
}
],
"Description": "This update upgrades apache2 to version 2.4.51-alt1. \nSecurity Fix(es):\n\n * BDU:2021-04216: Уязвимость модуля mod_proxy httpd-демона веб-сервера Apache HTTP Server, позволяющая нарушителю отправить скрытый HTTP-запрос (атака типа HTTP Request Smuggling)\n\n * BDU:2021-04820: Уязвимость модуля mod_proxy веб-сервера Apache HTTP Server, позволяющая нарушителю осуществить SSRF-атаку\n\n * BDU:2021-04902: Уязвимость веб-сервера Apache HTTP Server, связанная с ошибками разыменования указателей, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-04903: Уязвимость веб-сервера Apache HTTP Server, связанная с недостатками ограничения имени пути к каталогу, позволяющая нарушителю выполнить произвольный код или прочитать произвольные файлы в целевой системе\n\n * BDU:2021-04904: Уязвимость веб-сервера Apache HTTP Server, связанная с недостатками проверки пути к каталогам, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-05873: Уязвимость веб-сервера Apache HTTP Server, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-06099: Уязвимость функции mod_proxy_uwsgi веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-00203: Уязвимость функции ap_escape_quotes() веб-сервера Apache HTTP Server, связанная с записью за границами буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2021-33193: A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.\n\n * CVE-2021-34798: Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.\n\n * CVE-2021-36160: A carefully crafted request uri-path can cause mod_proxy_uwsgi to read above the allocated memory and crash (DoS). This issue affects Apache HTTP Server versions 2.4.30 to 2.4.48 (inclusive).\n\n * CVE-2021-39275: ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.\n\n * CVE-2021-40438: A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.\n\n * CVE-2021-41524: While fuzzing the 2.4.49 httpd, a new null pointer dereference was detected during HTTP/2 request processing, allowing an external source to DoS the server. This requires a specially crafted request. The vulnerability was recently introduced in version 2.4.49. No exploit is known to the project.\n\n * CVE-2021-41773: A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue is known to be exploited in the wild. This issue only affects Apache 2.4.49 and not earlier versions. The fix in Apache HTTP Server 2.4.50 was found to be incomplete, see CVE-2021-42013.\n\n * CVE-2021-42013: It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was insufficient. An attacker could use a path traversal attack to map URLs to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration \"require all denied\", these requests can succeed. If CGI scripts are also enabled for these aliased pathes, this could allow for remote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions.\n\n * #40688: apachectl2 переопределяет LANG, LANGUAGE и LC_ALL",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-10-18"
},
"Updated": {
"Date": "2021-10-18"
},
"BDUs": [
{
"ID": "BDU:2021-04216",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"CWE": "CWE-444",
"Href": "https://bdu.fstec.ru/vul/2021-04216",
"Impact": "Low",
"Public": "20210511"
},
{
"ID": "BDU:2021-04820",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-918",
"Href": "https://bdu.fstec.ru/vul/2021-04820",
"Impact": "Critical",
"Public": "20210923"
},
{
"ID": "BDU:2021-04902",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2021-04902",
"Impact": "High",
"Public": "20211005"
},
{
"ID": "BDU:2021-04903",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-22",
"Href": "https://bdu.fstec.ru/vul/2021-04903",
"Impact": "High",
"Public": "20211005"
},
{
"ID": "BDU:2021-04904",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-22, CWE-78",
"Href": "https://bdu.fstec.ru/vul/2021-04904",
"Impact": "Critical",
"Public": "20211007"
},
{
"ID": "BDU:2021-05873",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2021-05873",
"Impact": "High",
"Public": "20210916"
},
{
"ID": "BDU:2021-06099",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-06099",
"Impact": "High",
"Public": "20210426"
},
{
"ID": "BDU:2022-00203",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-00203",
"Impact": "Critical",
"Public": "20210804"
}
],
"CVEs": [
{
"ID": "CVE-2021-33193",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-33193",
"Impact": "High",
"Public": "20210816"
},
{
"ID": "CVE-2021-34798",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-34798",
"Impact": "High",
"Public": "20210916"
},
{
"ID": "CVE-2021-36160",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-36160",
"Impact": "High",
"Public": "20210916"
},
{
"ID": "CVE-2021-39275",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-39275",
"Impact": "Critical",
"Public": "20210916"
},
{
"ID": "CVE-2021-40438",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-918",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-40438",
"Impact": "Critical",
"Public": "20210916"
},
{
"ID": "CVE-2021-41524",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-41524",
"Impact": "High",
"Public": "20211005"
},
{
"ID": "CVE-2021-41773",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-22",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-41773",
"Impact": "High",
"Public": "20211005"
},
{
"ID": "CVE-2021-42013",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-22",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-42013",
"Impact": "Critical",
"Public": "20211007"
}
],
"Bugzilla": [
{
"ID": "40688",
"Href": "https://bugzilla.altlinux.org/40688",
"Data": "apachectl2 переопределяет LANG, LANGUAGE и LC_ALL"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20213060001",
"Comment": "apache2 is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060002",
"Comment": "apache2-ab is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060003",
"Comment": "apache2-base is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060004",
"Comment": "apache2-cgi-bin is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060005",
"Comment": "apache2-cgi-bin-printenv is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060006",
"Comment": "apache2-cgi-bin-test-cgi is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060007",
"Comment": "apache2-compat is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060008",
"Comment": "apache2-configs-A1PROXIED is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060009",
"Comment": "apache2-datadirs is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060010",
"Comment": "apache2-devel is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060011",
"Comment": "apache2-docs is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060012",
"Comment": "apache2-full is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060013",
"Comment": "apache2-htcacheclean is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060014",
"Comment": "apache2-htcacheclean-control is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060015",
"Comment": "apache2-html is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060016",
"Comment": "apache2-htpasswd is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060017",
"Comment": "apache2-httpd-event is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060018",
"Comment": "apache2-httpd-prefork is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060019",
"Comment": "apache2-httpd-worker is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060020",
"Comment": "apache2-icons is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060021",
"Comment": "apache2-manual is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060022",
"Comment": "apache2-manual-addons is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060023",
"Comment": "apache2-mod_cache_disk is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060024",
"Comment": "apache2-mod_ldap is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060025",
"Comment": "apache2-mod_proxy_html is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060026",
"Comment": "apache2-mod_ssl is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060027",
"Comment": "apache2-mod_ssl-compat is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060028",
"Comment": "apache2-mods is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060029",
"Comment": "apache2-suexec is earlier than 1:2.4.51-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20213060030",
"Comment": "rpm-build-apache2 is earlier than 1:2.4.51-alt1"
}
]
}
]
}
}
]
}