TITLE:
Mandriva update for apache2

SECUNIA ADVISORY ID:
SA18161

VERIFY ADVISORY:
http://secunia.com/advisories/18161/

CRITICAL:
Moderately critical

IMPACT:
DoS

WHERE:
>From remote

OPERATING SYSTEM:
Mandrakelinux 10.1
http://secunia.com/product/4198/

DESCRIPTION:
Mandriva has issued an update for apache2. This fixes a
vulnerability, which can be exploited by malicious people to cause a
DoS (Denial of Service).

For more information:
SA16559

SOLUTION:
Apply updated packages.

Mandrakelinux 10.1:

2bd9be4b3efe255f4db55fce501d15a8
10.1/RPMS/apache2-2.0.50-7.5.101mdk.i586.rpm
cb9bdc9ef96ce17340128d43b2a00cf0
10.1/RPMS/apache2-common-2.0.50-7.5.101mdk.i586.rpm
aa201695e4c76d17f9a533ad7809660d
10.1/RPMS/apache2-devel-2.0.50-7.5.101mdk.i586.rpm
6e494c490870ed813cbf5b03092a0ed5
10.1/RPMS/apache2-manual-2.0.50-7.5.101mdk.i586.rpm
af3f760be31e9cdcc606a359e0994260
10.1/RPMS/apache2-mod_cache-2.0.50-7.5.101mdk.i586.rpm
6496ac5d42657d967a585dd5244a3138
10.1/RPMS/apache2-mod_dav-2.0.50-7.5.101mdk.i586.rpm
f510bd2caadb07420720ac14aa9e7ba5
10.1/RPMS/apache2-mod_deflate-2.0.50-7.5.101mdk.i586.rpm
51504aa311d28f43ae72d699d56cf2d0
10.1/RPMS/apache2-mod_disk_cache-2.0.50-7.5.101mdk.i586.rpm
7acd176a42ce0f5251e8b1f380fdfe63
10.1/RPMS/apache2-mod_file_cache-2.0.50-7.5.101mdk.i586.rpm
b359fc952ebdc85f7aa8536a644821b9
10.1/RPMS/apache2-mod_ldap-2.0.50-7.5.101mdk.i586.rpm
19b66959762b0b4f5a2ad27741e27d16
10.1/RPMS/apache2-mod_mem_cache-2.0.50-7.5.101mdk.i586.rpm
d12b0ef4e3c8a84d5eb11a7f07d14cca
10.1/RPMS/apache2-mod_proxy-2.0.50-7.5.101mdk.i586.rpm
6705ee3928a58246748d84173c6fa4ce
10.1/RPMS/apache2-modules-2.0.50-7.5.101mdk.i586.rpm
8db8adeabe3dd1f50ff6eb583e502c5f
10.1/RPMS/apache2-source-2.0.50-7.5.101mdk.i586.rpm
00c648dff79ae63e37240c5445462a46
10.1/RPMS/apache2-worker-2.0.50-7.5.101mdk.i586.rpm
14bbad2d7310bc36ba4a70eed392916f
10.1/SRPMS/apache2-2.0.50-7.5.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:

1107fed88c85911bb749b6d579eb18a2
x86_64/10.1/RPMS/apache2-2.0.50-7.5.101mdk.x86_64.rpm
5ff4eb580bb7de3c3ac39ef78cc549b0
x86_64/10.1/RPMS/apache2-common-2.0.50-7.5.101mdk.x86_64.rpm
fcb64e228bb9dc32fae9c12c0cf82e0a
x86_64/10.1/RPMS/apache2-devel-2.0.50-7.5.101mdk.x86_64.rpm
5ee31fe2edc48dfe481e6927656fdb73
x86_64/10.1/RPMS/apache2-manual-2.0.50-7.5.101mdk.x86_64.rpm
efee4460197fdce90ceba72e97b0d429
x86_64/10.1/RPMS/apache2-mod_cache-2.0.50-7.5.101mdk.x86_64.rpm
217cd580c01d18e28923dbefbd8956d1
x86_64/10.1/RPMS/apache2-mod_dav-2.0.50-7.5.101mdk.x86_64.rpm
64c018efd41b3b9265ef73a9589551b8
x86_64/10.1/RPMS/apache2-mod_deflate-2.0.50-7.5.101mdk.x86_64.rpm
e4bdf02a516b061b6f783d6be5ad6484
x86_64/10.1/RPMS/apache2-mod_disk_cache-2.0.50-7.5.101mdk.x86_64.rpm
eb8843b6a5da24a283e56add50fe5ff6
x86_64/10.1/RPMS/apache2-mod_file_cache-2.0.50-7.5.101mdk.x86_64.rpm
a70b84f0f6e916eb3d72474fac8054c0
x86_64/10.1/RPMS/apache2-mod_ldap-2.0.50-7.5.101mdk.x86_64.rpm
723fe53862f96148b00bb9eb49eac03f
x86_64/10.1/RPMS/apache2-mod_mem_cache-2.0.50-7.5.101mdk.x86_64.rpm
bf6c31bd761c55ba63118aa0ed097430
x86_64/10.1/RPMS/apache2-mod_proxy-2.0.50-7.5.101mdk.x86_64.rpm
302e2e4e747f543e70f240415a1dc249
x86_64/10.1/RPMS/apache2-modules-2.0.50-7.5.101mdk.x86_64.rpm
cc67b2591839741292daceb69ceebeec
x86_64/10.1/RPMS/apache2-source-2.0.50-7.5.101mdk.x86_64.rpm
8d19a5c232217dc9d37a8a6c7e54af58
x86_64/10.1/RPMS/apache2-worker-2.0.50-7.5.101mdk.x86_64.rpm
14bbad2d7310bc36ba4a70eed392916f
x86_64/10.1/SRPMS/apache2-2.0.50-7.5.101mdk.src.rpm

ORIGINAL ADVISORY:
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:233

OTHER REFERENCES:
SA16559:
http://secunia.com/advisories/16559/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------