---------------------------------------------------------------------- Try a new way to discover vulnerabilities that ALREADY EXIST in your IT infrastructure. The Secunia NSI enables you to INSPECT, DISCOVER, and DOCUMENT vulnerabilities in more than 4,700 different Windows applications. Request your account, the Secunia Network Software Inspector (NSI): http://secunia.com/network_software_inspector/ ---------------------------------------------------------------------- TITLE: Fedora update for httpd SECUNIA ADVISORY ID: SA26952 VERIFY ADVISORY: http://secunia.com/advisories/26952/ CRITICAL: Less critical IMPACT: DoS WHERE: >From remote OPERATING SYSTEM: Fedora Core 6 http://secunia.com/product/12487/ DESCRIPTION: Fedora has issued an update for httpd. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service). For more information: SA26636 SOLUTION: Apply updated packages. f2d7130ea550e25331f14cff26066fbc9a978abd SRPMS/httpd-2.2.6-1.fc6.src.rpm f2d7130ea550e25331f14cff26066fbc9a978abd noarch/httpd-2.2.6-1.fc6.src.rpm 2194fc3927adaf1b9784bcadcfeaee941a419f8b ppc/debug/httpd-debuginfo-2.2.6-1.fc6.ppc.rpm 49f865e0fc193b89590202b5ca66a012ccc3fc4f ppc/httpd-devel-2.2.6-1.fc6.ppc.rpm 3db0e4f54f9d9cab85243d6c134a97ce748f9688 ppc/mod_ssl-2.2.6-1.fc6.ppc.rpm 566e7527c04b7358f99f800412a669ebcb0c5438 ppc/httpd-2.2.6-1.fc6.ppc.rpm 5af15e960f40607bbe6b62f63d979278b360b4c1 ppc/httpd-manual-2.2.6-1.fc6.ppc.rpm 2b0502d4915d3fab6417963d971f484c7215b419 x86_64/debug/httpd-debuginfo-2.2.6-1.fc6.x86_64.rpm c3f8001e0c99f8847f286d48abb76461e77bc80d x86_64/httpd-manual-2.2.6-1.fc6.x86_64.rpm 761c0ce29a2e40191f3f1b0f0575d507c0e61b7a x86_64/httpd-devel-2.2.6-1.fc6.x86_64.rpm 897dda6971bc3c1fa65cb61acf0f370b3c6743ad x86_64/mod_ssl-2.2.6-1.fc6.x86_64.rpm 13224b1e1e34639fbe61778db72e36896937752c x86_64/httpd-2.2.6-1.fc6.x86_64.rpm ea0c36272d58058375243fd083baa4cf7cdd1410 i386/httpd-manual-2.2.6-1.fc6.i386.rpm 9309193f84872e474773559dd588f1c96fa6b72e i386/debug/httpd-debuginfo-2.2.6-1.fc6.i386.rpm a219ca1f181e2a0d5161423ad5226ff37770cec0 i386/httpd-devel-2.2.6-1.fc6.i386.rpm d1cd17eeef15e89ea514d6795a408452092ae552 i386/mod_ssl-2.2.6-1.fc6.i386.rpm f60adf43a42115b4a3c3f4ae1e65eb1fc08c5de9 i386/httpd-2.2.6-1.fc6.i386.rpm ORIGINAL ADVISORY: https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00353.html OTHER REFERENCES: SA26636: http://secunia.com/advisories/26636/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------