From Mageia wiki
Jump to: navigation, search

MGASA-2013-0129

Date: May 2nd, 2013
Affected releases: 2
Media: Core


Description:
Updated apache-mod_security packages fix security vulnerability:

Timur Yunusov and Alexey Osipov from Positive Technologies discovered
that the XML files parser of ModSecurity, an Apache module whose purpose
is to tighten the Web application security, is vulnerable to XML external
entities attacks.
A specially-crafted XML file provided by a remote attacker, could lead
to local file disclosure or excessive resources (CPU, memory) consumption
when processed (CVE-2013-1915).

This update introduces a SecXmlExternalEntity option which is "Off" by
default. This will disable the ability of libxml2 to load external
entities.


Updated Packages:
i586:
apache-mod_security-2.6.3-3.4.mga2.i586.rpm
mlogc-2.6.3-3.4.mga2.i586.rpm
apache-mod_security-debug-2.6.3-3.4.mga2.i586.rpm

x86_64:
apache-mod_security-2.6.3-3.4.mga2.x86_64.rpm
mlogc-2.6.3-3.4.mga2.x86_64.rpm
apache-mod_security-debug-2.6.3-3.4.mga2.x86_64.rpm

SRPMS:
apache-mod_security-2.6.3-3.4.mga2.src.rpm


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1915
http://www.debian.org/security/2013/dsa-2659
https://bugs.mageia.org/show_bug.cgi?id=9704