Thanks,

I use the information an request an exempt from the company scanning our
systems.

David Hollinger III
IT Infrastructure Coordinator
Handwriting Without Tears
(301)263-2700 ext 285
(402)430-3127


-----Original Message-----
From: boun...@canonical.com [mailto:boun...@canonical.com] On Behalf Of Marc 
Deslauriers
Sent: Tuesday, August 16, 2011 4:49 PM
To: David Hollinger
Subject: [Bug 827662] Re: PCI Security failure Apache 2.2.14

Your PCI scanning software is broken, it is scanning for software version 
numbers instead of looking at specific package versions.
See: https://wiki.ubuntu.com/SecurityTeam/FAQ#Versions

For the specific CVE numbers you've mentioned:
CVE-2010-0425 is a windows-specific vulnerability, it doesn't apply to Ubuntu
CVE-2010-0434 is fixed already, see http://www.ubuntu.com/usn/usn-908-1/
CVE-2010-1452 is fixed already, see http://www.ubuntu.com/usn/usn-1021-1/
CVE-2010-1623 is fixed already, see http://www.ubuntu.com/usn/usn-1021-1/
CVE-2010-2068 is a windows-specific vulnerability, it doesn't apply to Ubuntu
CVE-2011-0419 is fixed already, see http://www.ubuntu.com/usn/usn-1134-1/
CVE-2011-1928 is fixed already, see http://www.ubuntu.com/usn/usn-1134-1/

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-0425

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-0434

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-1452

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-1623

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2010-2068

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-0419

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2011-1928

** Visibility changed to: Public

** Changed in: apache2 (Ubuntu)
       Status: New => Invalid

-- 
You received this bug notification because you are subscribed to the bug
report.
https://bugs.launchpad.net/bugs/827662

Title:
  PCI Security failure Apache 2.2.14

Status in “apache2” package in Ubuntu:
  Invalid

Bug description:
  We're running Ubuntu 10.04.3 as a server for our monitoring system and
  it's open to the outside so we can check the status from anywhere
  using our mobile devices.  However, we are bringing our systems up to
  be PCI Compliant and the server fails PCI Security tests everytime due
  to vulnerabilities in Apache versions 2.2.18 and below.  Currently,
  Lucid Server only has Apache 2.2.14 in the repos.  Since Lucid is LTS,
  I would expect at some point this would be updated to Apache 2.2.19
  since it contains the necessary security updates to bring Apache up to
  PCI Standards.

  here's a copy of what was reported to us:

  Description: vulnerable 
  Apache version: 2.2.14 12.27.211.13312.27.211.133
  Aug 16 14:24:06 2011new

  Severity: Critical Problem CVE: CVE-2010-0425 CVE-2010-0434
  CVE-2010-1452 CVE-2010-1623 CVE-2010-2068 CVE-2011-0419 CVE-2011-1928
  10.010new11

  Impact: A remote attacker could crash the web server or execute
  arbitrary commands.

  Background: Apache is a web server which runs on Unix, Linux, Mac OS
  and Windows systems. Apache web servers support chunked encoding,
  which is part of the HTTP protocol specification. Chunked encoding is
  used by a web client to send data to the server in parts, or chunks.
  After a chunk is received, the server indicates that it is ready to
  receive the next chunk, until all of the data has been received.

  Resolution [http://httpd.apache.org/download.cgi] Upgrade Apache 1.x to 
version 1.3.41-dev or higher, 2.0.x to version 2.0.64-dev or higher when 
available, or a version higher than 2.2.18. 
  Vulnerability Details: Service: http Received: Server: Apache/2.2.14 (Ubuntu)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/827662/+subscriptions

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to apache2 in Ubuntu.
https://bugs.launchpad.net/bugs/827662

Title:
  PCI Security failure Apache 2.2.14

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apache2/+bug/827662/+subscriptions

-- 
Ubuntu-server-bugs mailing list
Ubuntu-server-bugs@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-server-bugs

Reply via email to