This issue affects httpd packages as shipped with Red Hat Enterprise Linux 3 and 4, which are now in the Extended Life Phase of their life cycle. Therefore this issue is not planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/
CVSS v2 metrics
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Red Hat Security Errata
|Red Hat Enterprise Linux 5 (httpd)||RHSA-2012:0323||2012-02-21|
|Red Hat Enterprise Linux 6 (httpd)||RHSA-2012:0128||2012-02-13|
|Red Hat JBoss Enterprise Web Server 1 for RHEL 6 Server (httpd)||RHSA-2012:0542||2012-05-07|
|Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server (httpd)||RHSA-2012:0542||2012-05-07|
|Red Hat JBoss Web Server 1.0||RHSA-2012:0543||2012-05-07|
Affected Packages State
|Red Hat Enterprise Linux 4||httpd||Will not fix|
|Red Hat Directory Server 8||httpd||Will not fix|
|Red Hat Certificate System 7.3 for 4AS||httpd||Will not fix|
As noted in the original reporter's advisory (see comment #5), this issue can be mitigated by using a custom ErrorDocument setting, such as:
ErrorDocument 400 "Bad Request"
It should be noted that ErrorDocument setting using path or external URL does not mitigate this issue.
CVE description copyright © 2017, The MITRE Corporation