Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2012:0542 - Security Advisory
Issued:
2012-05-07
Updated:
2012-05-07

RHSA-2012:0542 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: httpd security and bug fix update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated httpd packages that fix multiple security issues and one bug are
now available for JBoss Enterprise Web Server 1.0.2 for Red Hat Enterprise
Linux 5 and 6.

The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The Apache HTTP Server ("httpd") is the namesake project of The Apache
Software Foundation.

It was discovered that the Apache HTTP Server did not properly validate the
request URI for proxied requests. In certain configurations, if a reverse
proxy used the ProxyPassMatch directive, or if it used the RewriteRule
directive with the proxy flag, a remote attacker could make the proxy
connect to an arbitrary server, possibly disclosing sensitive information
from internal web servers not directly accessible to the attacker.
(CVE-2011-3368)

It was discovered that mod_proxy_ajp incorrectly returned an "Internal
Server Error" response when processing certain malformed HTTP requests,
which caused the back-end server to be marked as failed in configurations
where mod_proxy was used in load balancer mode. A remote attacker could
cause mod_proxy to not send requests to back-end AJP (Apache JServ
Protocol) servers for the retry timeout period or until all back-end
servers were marked as failed. (CVE-2011-3348)

The httpd server included the full HTTP header line in the default error
page generated when receiving an excessively long or malformed header.
Malicious JavaScript running in the server's domain context could use this
flaw to gain access to httpOnly cookies. (CVE-2012-0053)

An integer overflow flaw, leading to a heap-based buffer overflow, was
found in the way httpd performed substitutions in regular expressions. An
attacker able to set certain httpd settings, such as a user permitted to
override the httpd configuration for a specific directory using a
".htaccess" file, could use this flaw to crash the httpd child process or,
possibly, execute arbitrary code with the privileges of the "apache" user.
(CVE-2011-3607)

A NULL pointer dereference flaw was found in the httpd mod_log_config
module. In configurations where cookie logging is enabled, a remote
attacker could use this flaw to crash the httpd child process via an HTTP
request with a malformed Cookie header. (CVE-2012-0021)

A flaw was found in the way httpd handled child process status information.
A malicious program running with httpd child process privileges (such as a
PHP or CGI script) could use this flaw to cause the parent httpd process to
crash during httpd service shutdown. (CVE-2012-0031)

Red Hat would like to thank Context Information Security for reporting the
CVE-2011-3368 issue.

This update also fixes the following bug:

  • The fix for CVE-2011-3192 provided by the RHSA-2011:1329 update

introduced a regression in the way httpd handled certain Range HTTP header
values. This update corrects this regression. (BZ#749071)

All users of JBoss Enterprise Web Server 1.0.2 should upgrade to these
updated packages, which contain backported patches to correct these issues.
After installing the updated packages, users must restart the httpd
service for the update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • JBoss Enterprise Web Server 1 for RHEL 6 x86_64
  • JBoss Enterprise Web Server 1 for RHEL 6 i386
  • JBoss Enterprise Web Server 1 for RHEL 5 x86_64
  • JBoss Enterprise Web Server 1 for RHEL 5 i386

Fixes

  • BZ - 736690 - CVE-2011-3348 httpd: mod_proxy_ajp remote temporary DoS
  • BZ - 740045 - CVE-2011-3368 httpd: reverse web proxy vulnerability
  • BZ - 749071 - httpd: RHSA-2011:1329 and RHSA-2011:1330 range 0- handling regression
  • BZ - 769844 - CVE-2011-3607 httpd: ap_pregsub Integer overflow to buffer overflow
  • BZ - 773744 - CVE-2012-0031 httpd: possible crash on shutdown due to flaw in scoreboard handling
  • BZ - 785065 - CVE-2012-0021 httpd: NULL pointer dereference crash in mod_log_config
  • BZ - 785069 - CVE-2012-0053 httpd: cookie exposure due to error responses

CVEs

  • CVE-2011-3368
  • CVE-2011-3348
  • CVE-2011-3607
  • CVE-2012-0053
  • CVE-2012-0031
  • CVE-2012-0021

References

  • https://access.redhat.com/security/updates/classification/#moderate
  • https://rhn.redhat.com/errata/RHSA-2011-1329.html
Note: More recent versions of these packages may be available. Click a package name for more details.

JBoss Enterprise Web Server 1 for RHEL 6

SRPM
httpd-2.2.17-15.4.ep5.el6.src.rpm SHA-256: d319f55f155bab323a1f8d2d6ca46a3e686b6933ba9316262805fe1b003e87bb
x86_64
httpd-2.2.17-15.4.ep5.el6.x86_64.rpm SHA-256: 984655a17f23031f3f4e3f4a8cbc428ae627baf64dbf41df0da29b7110bec94c
httpd-devel-2.2.17-15.4.ep5.el6.x86_64.rpm SHA-256: 20507e34cf164d3fa45a7c80aea302ebff807055c45a818dd5ffb410de609e48
httpd-manual-2.2.17-15.4.ep5.el6.x86_64.rpm SHA-256: 980585bb79fab24f2e5a8348873f7d95eca58850c85ba40f730e556da4be226a
httpd-tools-2.2.17-15.4.ep5.el6.x86_64.rpm SHA-256: c74883f09a3ef91a5d5d51a2a266152a6318914ac900375b947bd216360b05f6
mod_ssl-2.2.17-15.4.ep5.el6.x86_64.rpm SHA-256: f5532a74158a220a0beef33337e6a7d1cb12690360c140ddd77713ff6de96593
i386
httpd-2.2.17-15.4.ep5.el6.i386.rpm SHA-256: a50aff5f82601b45e6a2b67fed4a15ef623fb48e724fb137f3e3ff32c203b8f6
httpd-devel-2.2.17-15.4.ep5.el6.i386.rpm SHA-256: f6ed68e0c06c011d04723726338ec55be69de738cad9719d4c1cdff6cd1cb766
httpd-manual-2.2.17-15.4.ep5.el6.i386.rpm SHA-256: 08007a9d14b588dec95767a17a594a37a8c08b00588a3410a6f56d1fba4dfd55
httpd-tools-2.2.17-15.4.ep5.el6.i386.rpm SHA-256: 634d49816fc2e19e26047871c816e1f1e2ad6a31be1247a8c68918e3ba567755
mod_ssl-2.2.17-15.4.ep5.el6.i386.rpm SHA-256: fb9b6843bf940bebcbefb89dd98fc0b956f434b0f212720007da233f1d3112ac

JBoss Enterprise Web Server 1 for RHEL 5

SRPM
httpd-2.2.17-15.4.ep5.el5.src.rpm SHA-256: 92d760ee333664be297924af2846001a50c9e5896377f74a4013f60344313110
x86_64
httpd-2.2.17-15.4.ep5.el5.x86_64.rpm SHA-256: e5f65c1d7f7d3c97f829885661cfadb14fe0d08fb24479f7dcd8ef719e31445e
httpd-devel-2.2.17-15.4.ep5.el5.x86_64.rpm SHA-256: ab908555fddf89d83ec962edbcf1fe46894b6d31e3af852d79809beeba4a36f1
httpd-manual-2.2.17-15.4.ep5.el5.x86_64.rpm SHA-256: 1d1c57c213071bdf33a3b7c0e191c7f8ece807fe65af8827a6ddb198864e24d1
mod_ssl-2.2.17-15.4.ep5.el5.x86_64.rpm SHA-256: bc124fb6bdd4424e7c5f64218adcf3909bb9b4a11db6b40ae2bf799d5e1447dc
i386
httpd-2.2.17-15.4.ep5.el5.i386.rpm SHA-256: 1a040781a1f359644be137ff74106ecacdd605bc119fcb0fb1896dab1ef150c3
httpd-devel-2.2.17-15.4.ep5.el5.i386.rpm SHA-256: e62ca04c8f55c42a80a67f88996ff9387975463a63f44f96ed38712c13308528
httpd-manual-2.2.17-15.4.ep5.el5.i386.rpm SHA-256: 1b3a16dbe63159037dae6c095eff389e6206ea0026c4f5c6dbe293f63d973909
mod_ssl-2.2.17-15.4.ep5.el5.i386.rpm SHA-256: 6f7a49ae54ea3f674bcac55ee2456bf169c96f18e26a6eb9bc515cee648758cf

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility