Announcement

Collapse
No announcement yet.

Regarding CVE-2011-3368

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Regarding CVE-2011-3368

    Hello!

    Recently, after a security scan performed by our internal auditors, the vulnerability CVE-2011-3368 was found in our CloudLinux 6.8 (httpd-2.2.15-54.el6_8) installation.

    My guess is that the scanner just saw the Apache version and assumed it was vulnerable, but I have confirmation that Red Hat backported the fix to Apache version 2.2.15-9 (https://access.redhat.com/security/cve/cve-2011-3368)

    I think this should be already fixed, but I cant find any formal confirmation from CloudLinux team. Could someone from CloudLinux confirm this? I have my bosses after me to confirm it.

    Thank you very much in advance for your time and help, regards...

  • #2
    Hello, thank your for your post. I see a few problems here, first of all, the latest CloudLinux release is 6.9 and the latest httpd version in CloudLinux 6 is httpd-2.2.15-59.el6.cloudlinux, so, you may want to update to gain latest patches and features.

    But anyway, even the outdated package contains the required patch:

    * Thu Oct 6 08:00:00 2011 Joe Orton <jorton@redhat.com> - 2.2.15-15 - mod_proxy_ftp: fix handling of EPSV w/IPv6 localhost (#737960) - core: add security fix for CVE-2011-3368 (#743659) - mod_proxy_ajp: add security fix for CVE-2011-3348 (#738961) - mod_cache: forward-port CacheMaxExpire "hard" option (#740242)

    You can check packages changelog using the following command:

    rpm -q --changelog httpd

    Please let me know if you have additional questions. Also, you can ask our support for help here: https://cloudlinux.zendesk.com/hc/en-us/requests/new

    Comment

    Working...
    X