Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2011-3639

Overview

Vulnerability Score 4.3 4.3
CVE Id CVE-2011-3639
Last Modified 24 Feb 2012 11:18:53
Published 29 Nov 2011 11:05:58
Confidentiality Impact NONE NONE
Integrity Impact PARTIAL PARTIAL
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2011-3639

Summary

The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.

Vulnerable Systems

Application

  • Apache Http Server 2.0.11

  • Apache Http Server 2.0.12

  • Apache Http Server 2.0.13

  • Apache Http Server 2.0.14

  • Apache Http Server 2.0.15

  • Apache Http Server 2.0.16

  • Apache Http Server 2.0.17

  • Apache Http Server 2.0.18

  • Apache Http Server 2.0.19

  • Apache Http Server 2.0.20

  • Apache Http Server 2.0.21

  • Apache Http Server 2.0.22

  • Apache Http Server 2.0.23

  • Apache Http Server 2.0.24

  • Apache Http Server 2.0.25

  • Apache Http Server 2.0.26

  • Apache Http Server 2.0.27

  • Apache Http Server 2.0.28

  • Apache Http Server 2.0.29

  • Apache Http Server 2.0.30

  • Apache Http Server 2.0.31

  • Apache Http Server 2.0.32

  • Apache Http Server 2.0.33

  • Apache Http Server 2.0.34

  • Apache Http Server 2.0.35

  • Apache Http Server 2.0.36

  • Apache Http Server 2.0.37

  • Apache Http Server 2.0.38

  • Apache Http Server 2.0.39

  • Apache Http Server 2.0.40

  • Apache Http Server 2.0.41

  • Apache Http Server 2.0.42

  • Apache Http Server 2.0.43

  • Apache Http Server 2.0.44

  • Apache Http Server 2.0.45

  • Apache Http Server 2.0.46

  • Apache Http Server 2.0.47

  • Apache Http Server 2.0.48

  • Apache Http Server 2.0.49

  • Apache Http Server 2.0.50

  • Apache Http Server 2.0.51

  • Apache Http Server 2.0.52

  • Apache Http Server 2.0.53

  • Apache Http Server 2.0.54

  • Apache Http Server 2.0.55

  • Apache Http Server 2.0.56

  • Apache Http Server 2.0.57

  • Apache Http Server 2.0.58

  • Apache Http Server 2.0.59

  • Apache Http Server 2.0.61

  • Apache Http Server 2.0.63

  • Apache Http Server 2.2.0

  • Apache Http Server 2.2.1

  • Apache Http Server 2.2.10

  • Apache Http Server 2.2.11

  • Apache Http Server 2.2.12

  • Apache Http Server 2.2.13

  • Apache Http Server 2.2.14

  • Apache Http Server 2.2.15

  • Apache Http Server 2.2.16

  • Apache Http Server 2.2.17

  • Apache Http Server 2.2.2

  • Apache Http Server 2.2.3

  • Apache Http Server 2.2.4

  • Apache Http Server 2.2.6

  • Apache Http Server 2.2.8

  • Apache Http Server 2.2.9

  • Apache Http Server2.0a1

  • Apache Http Server2.0a2

  • Apache Http Server2.0a3

  • Apache Http Server2.0a4

  • Apache Http Server2.0a5

  • Apache Http Server2.0a6

  • Apache Http Server2.0a7

  • Apache Http Server2.0a8

  • Apache Http Server2.0a9


References

CONFIRM - https://bugzilla.redhat.com/show_bug.cgi?id=752080

CONFIRM - http://svn.apache.org/viewvc?view=revision&revision=1188745

REDHAT - RHSA-2012:0128

Related Patches

Red Hat 2012:0323-01 RHSA Moderate: httpd security update for RHEL 5 x86

Red Hat 2012:0323-01 RHSA Moderate: httpd security update for RHEL 5 x86_64

Novell SUSE 2011:5482 apache2 security update for SLES 11 SP1 i586

Novell SUSE 2011:5482 apache2 security update for SLES 11 SP1 x86_64

Novell SUSE 2011:7882 apache2 security update for SLES 10 SP4 i586

Novell SUSE 2011:7882 apache2 security update for SLES 10 SP4 x86_64


Last Updated: 27 May 2016 10:58:19