Hide Forgot
Common Vulnerabilities and Exposures assigned an identifier CVE-2013-1896 to the following vulnerability: mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI. References: http://www.apache.org/dist/httpd/Announcement2.2.html http://svn.apache.org/viewvc?view=revision&revision=1485668
This issue affects the versions of the httpd package, as shipped with Red Hat Enterprise Linux 4, 5, and 6. -- This issue affects the versions of the httpd package, as shipped with Fedora release of 17, 18, and 19. Please schedule an update.
Created httpd tracking bugs for this issue: Affects: fedora-all [bug 983618]
Upstream patch against v.2.4.x branch: http://svn.apache.org/viewvc?view=revision&revision=1486461
This issue has been addressed in following products: JBEWS 2 for RHEL 5 JBEWS 2 for RHEL 6 Via RHSA-2013:1133 https://rhn.redhat.com/errata/RHSA-2013-1133.html
This issue has been addressed in following products: JBEWS 2 for RHEL 5 JBEWS 2 for RHEL 6 JBEWS 2 for Solaris JBEWS 2 for Microsoft Windows Via RHSA-2013:1134 https://rhn.redhat.com/errata/RHSA-2013-1134.html
httpd-2.4.6-2.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Via RHSA-2013:1156 https://rhn.redhat.com/errata/RHSA-2013-1156.html
httpd-2.4.6-2.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in following products: Red Hat JBoss Enterprise Application Platform 6.1.1 Via RHSA-2013:1209 https://rhn.redhat.com/errata/RHSA-2013-1209.html
This issue has been addressed in following products: JBEAP 6 for RHEL 6 Via RHSA-2013:1208 https://rhn.redhat.com/errata/RHSA-2013-1208.html
This issue has been addressed in following products: JBEAP 6 for RHEL 5 Via RHSA-2013:1207 https://rhn.redhat.com/errata/RHSA-2013-1207.html