TITLE:
Mandriva update for apache2

SECUNIA ADVISORY ID:
SA18339

VERIFY ADVISORY:
http://secunia.com/advisories/18339/

CRITICAL:
Less critical

IMPACT:
Cross Site Scripting, DoS

WHERE:
>From remote

OPERATING SYSTEM:
Mandrakelinux 10.1
http://secunia.com/product/4198/

DESCRIPTION:
Mandriva has issued an update for apache2. This fixes two
vulnerabilities, which can be exploited by malicious people to cause
a DoS (Denial of Service) and to conduct cross-site scripting
attacks.

For more information:
SA18008
SA18307

SOLUTION:
Apply updated packages.

Mandrakelinux 10.1:

99d7e03e08f46bb8d2c6246cccc7f03a
10.1/RPMS/apache2-2.0.50-7.6.101mdk.i586.rpm
7338a879c51aad4c89484443c2b806ce
10.1/RPMS/apache2-common-2.0.50-7.6.101mdk.i586.rpm
e016511ca52a8afe34438d8262207768
10.1/RPMS/apache2-devel-2.0.50-7.6.101mdk.i586.rpm
bdebdafd3768e26c0d58ad1fc6cae9ff
10.1/RPMS/apache2-manual-2.0.50-7.6.101mdk.i586.rpm
b9f4c1a36d9e89f41de503b0f8428719
10.1/RPMS/apache2-mod_cache-2.0.50-7.6.101mdk.i586.rpm
7b6411056d388050ef4c98d3c1de3e24
10.1/RPMS/apache2-mod_dav-2.0.50-7.6.101mdk.i586.rpm
fd87e01a054073ab1a1ef9de5bb3ac54
10.1/RPMS/apache2-mod_deflate-2.0.50-7.6.101mdk.i586.rpm
ecf73bf07822403bbae9c453adad28b3
10.1/RPMS/apache2-mod_disk_cache-2.0.50-7.6.101mdk.i586.rpm
7174d7461248d61ae8294406937482f3
10.1/RPMS/apache2-mod_file_cache-2.0.50-7.6.101mdk.i586.rpm
daa7a98f93d00a64bb0a7a52324471cd
10.1/RPMS/apache2-mod_ldap-2.0.50-7.6.101mdk.i586.rpm
68ee307aedbe6af498d87fe112f835dc
10.1/RPMS/apache2-mod_mem_cache-2.0.50-7.6.101mdk.i586.rpm
610525fcf03a696c50192991d0a28c9b
10.1/RPMS/apache2-mod_proxy-2.0.50-7.6.101mdk.i586.rpm
5a2d76582859bc52306c6f22725f2ab7
10.1/RPMS/apache2-mod_ssl-2.0.50-4.4.101mdk.i586.rpm
1749b95a9ad45825cb085f82144794df
10.1/RPMS/apache2-modules-2.0.50-7.6.101mdk.i586.rpm
55a3abf1039dfb0c4d547685b3605fd4
10.1/RPMS/apache2-source-2.0.50-7.6.101mdk.i586.rpm
e7e0c2080af16bc3215ff67a841f6323
10.1/RPMS/apache2-worker-2.0.50-7.6.101mdk.i586.rpm
50bb5f9723f0146fe82d312f7fbeb2cf
10.1/SRPMS/apache2-2.0.50-7.6.101mdk.src.rpm
21c1f068fe82b86e3396b37f7ec96782
10.1/SRPMS/apache2-mod_ssl-2.0.50-4.4.101mdk.src.rpm

Mandrakelinux 10.1/X86_64:

43085852f7b6e5a55e4220cbd6493b74
x86_64/10.1/RPMS/apache2-2.0.50-7.6.101mdk.x86_64.rpm
2715904b29d6433d25f6ea35715d5484
x86_64/10.1/RPMS/apache2-common-2.0.50-7.6.101mdk.x86_64.rpm
71828de67a3c26f4061eeebef8e6de2b
x86_64/10.1/RPMS/apache2-devel-2.0.50-7.6.101mdk.x86_64.rpm
d37b18f9791c65466e5fafdf0287720e
x86_64/10.1/RPMS/apache2-manual-2.0.50-7.6.101mdk.x86_64.rpm
088b8334c6efef6f17a1602be41b6045
x86_64/10.1/RPMS/apache2-mod_cache-2.0.50-7.6.101mdk.x86_64.rpm
9326eca120d7ac3e71337bad1f85fef0
x86_64/10.1/RPMS/apache2-mod_dav-2.0.50-7.6.101mdk.x86_64.rpm
36818cef250fc94d074f0fc0f2c6d8c7
x86_64/10.1/RPMS/apache2-mod_deflate-2.0.50-7.6.101mdk.x86_64.rpm
63d37c81fe0b48ccd91d79e4c90dd5ec
x86_64/10.1/RPMS/apache2-mod_disk_cache-2.0.50-7.6.101mdk.x86_64.rpm
f7daa039d6878f063ca97468d9328fa8
x86_64/10.1/RPMS/apache2-mod_file_cache-2.0.50-7.6.101mdk.x86_64.rpm
13e394bc675d106270fe8fca27f7acbd
x86_64/10.1/RPMS/apache2-mod_ldap-2.0.50-7.6.101mdk.x86_64.rpm
8b1fd1bd22e33a25be158b7e152aba60
x86_64/10.1/RPMS/apache2-mod_mem_cache-2.0.50-7.6.101mdk.x86_64.rpm
f88328582773c7129bf2a341d9cb88db
x86_64/10.1/RPMS/apache2-mod_proxy-2.0.50-7.6.101mdk.x86_64.rpm
62170db76a317250d37884dfd07e3f1c
x86_64/10.1/RPMS/apache2-mod_ssl-2.0.50-4.4.101mdk.x86_64.rpm
eeedff56c6e4f15df683f9c98f0c7e8c
x86_64/10.1/RPMS/apache2-modules-2.0.50-7.6.101mdk.x86_64.rpm
aedf2f9b3ab9b65889546ce8dddb7930
x86_64/10.1/RPMS/apache2-source-2.0.50-7.6.101mdk.x86_64.rpm
99a1557b76f495547ada02c17044b472
x86_64/10.1/RPMS/apache2-worker-2.0.50-7.6.101mdk.x86_64.rpm
50bb5f9723f0146fe82d312f7fbeb2cf
x86_64/10.1/SRPMS/apache2-2.0.50-7.6.101mdk.src.rpm
21c1f068fe82b86e3396b37f7ec96782
x86_64/10.1/SRPMS/apache2-mod_ssl-2.0.50-4.4.101mdk.src.rpm

ORIGINAL ADVISORY:
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:007

OTHER REFERENCES:
SA18008:
http://secunia.com/advisories/18008/

SA18307:
http://secunia.com/advisories/18307/

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------