USN-488-1: mod_perl vulnerability

Publication date

18 July 2007

Overview

mod_perl vulnerability


Details

Alex Solovey discovered that mod_perl did not correctly validate certain
regular expression matches. A remote attacker could send a specially
crafted request to a web application using mod_perl, causing the web
server to monopolize CPU resources. This could lead to a remote denial
of service.

Alex Solovey discovered that mod_perl did not correctly validate certain
regular expression matches. A remote attacker could send a specially
crafted request to a web application using mod_perl, causing the web
server to monopolize CPU resources. This could lead to a remote denial
of service.

Update instructions

In general, a standard system upgrade is sufficient to effect the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
7.04 feisty libapache2-mod-perl2 –  2.0.2-2.3ubuntu1
6.10 edgy libapache2-mod-perl2 –  2.0.2-2ubuntu1.6.10.1
6.06 dapper libapache2-mod-perl2 –  2.0.2-2ubuntu1.6.06.1

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›