ID

VAR-201003-1105


CVE

CVE-2010-0434


TITLE

Apache mod_isapi module library unload results in orphaned callback pointers

Trust: 0.8

sources: CERT/CC: VU#280613

DESCRIPTION

The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request. The Apache mod_isapi module can be forced to unload a specific library before the processing of a request is complete, resulting in memory corruption. This vulnerability may allow a remote attacker to execute arbitrary code. When using the header customization function through the RequestHeader directive of Hitachi Web Server, if the RequestHeader directive is defined and the mod_headers module is being used through the LoadModule directive, it could allow an attacker to gain access to the data that have been deleted from the memory. If the header customization function of the RequestHeader directive is not used, the vulnerability does not apply.An attacker may gain access to the data that have been deleted from the memory. Apache is prone to an information-disclosure vulnerability. Attackers can leverage this issue to gain access to sensitive information; attacks may also result in denial-of-service conditions. Apache versions prior to 2.2.15 are affected. NOTE: This issue was previously described in BID 38494 (Apache Multiple Security Vulnerabilities), but has been assigned its own record to better document the vulnerability. Background ========== Apache HTTP Server is one of the most popular web servers on the Internet. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker might obtain sensitive information, gain privileges, send requests to unintended servers behind proxies, bypass certain security restrictions, obtain the values of HTTPOnly cookies, or cause a Denial of Service in various ways. A local attacker could gain escalated privileges. Workaround ========== There is no known workaround at this time. Resolution ========== All Apache HTTP Server users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/apache-2.2.22-r1" References ========== [ 1 ] CVE-2010-0408 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0408 [ 2 ] CVE-2010-0434 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0434 [ 3 ] CVE-2010-1452 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1452 [ 4 ] CVE-2010-2791 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2791 [ 5 ] CVE-2011-3192 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3192 [ 6 ] CVE-2011-3348 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3348 [ 7 ] CVE-2011-3368 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3368 [ 8 ] CVE-2011-3607 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3607 [ 9 ] CVE-2011-4317 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4317 [ 10 ] CVE-2012-0021 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0021 [ 11 ] CVE-2012-0031 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0031 [ 12 ] CVE-2012-0053 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0053 [ 13 ] CVE-2012-0883 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0883 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201206-25.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2012 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5 . ---------------------------------------------------------------------- Use WSUS to deploy 3rd party patches Public BETA http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/ ---------------------------------------------------------------------- TITLE: Apache HTTP Server Multiple Vulnerabilities SECUNIA ADVISORY ID: SA38776 VERIFY ADVISORY: http://secunia.com/advisories/38776/ DESCRIPTION: Some vulnerabilities have been reported in Apache HTTP Server, where one has unknown impacts and others can be exploited by malicious people to gain access to potentially sensitive information or cause a DoS (Denial of Service). 1) The "ap_proxy_ajp_request()" function in modules/proxy/mod_proxy_ajp.c of the mod_proxy_ajp module returns the "HTTP_INTERNAL_SERVER_ERROR" error code when processing certain malformed requests. This can be exploited to put the backend server into an error state until the retry timeout expired by sending specially crafted requests. 3) An error exists within the header handling when processing subrequests, which can lead to sensitive information from a request being handled by the wrong thread if a multi-threaded Multi-Processing Module (MPM) is used. Vulnerabilities #1 and #3 are reported in version 2.2.0, 2.2.2, 2.2.3, 2.2.4, 2.2.5, 2.2.6, 2.2.8, 2.2.9, 2.2.11, 2.2.12, 2.2.13, and 2.2.14. SOLUTION: Fixed in httpd 2.2.15-dev. Update to version 2.2.15 as soon as it becomes available. PROVIDED AND/OR DISCOVERED BY: 1, 2) Reported by the vendor. 3) Reported in a bug report by Philip Pickett ORIGINAL ADVISORY: http://httpd.apache.org/security/vulnerabilities_22.html http://svn.apache.org/viewvc?view=revision&revision=917875 http://svn.apache.org/viewvc?view=revision&revision=917870 https://issues.apache.org/bugzilla/show_bug.cgi?id=48359 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ VMware Security Advisory Advisory ID: VMSA-2010-0014 Synopsis: VMware Workstation, Player, and ACE address several security issues. Issue date: 2010-09-23 Updated on: 2010-09-23 (initial release of advisory) CVE numbers: CVE-2010-3277 CVE-2010-1205 CVE-2010-0205 CVE-2010-2249 CVE-2010-0434 CVE-2010-0425 - ------------------------------------------------------------------------ 1. Summary VMware Workstation and Player address a potential installer security issue and security issues in libpng. VMware ACE Management Server (AMS) for Windows updates Apache httpd. 2. Relevant releases VMware Workstation 7.1.1 and earlier, VMware Player 3.1.1 and earlier, VMware ACE Management Server 2.7.1 and earlier, Note: VMware Server was declared End Of Availability on January 2010, support will be limited to Technical Guidance for the duration of the support term. 3. Problem Description a. VMware Workstation and Player installer security issue The Workstation 7.x and Player 3.x installers will load an index.htm file located in the current working directory on which Workstation 7.x or Player 3.x is being installed. This may allow an attacker to display a malicious file if they manage to get their file onto the system prior to installation. The issue can only be exploited at the time that Workstation 7.x or Player 3.x is being installed. The security issue is no longer present in the installer of the new versions of Workstation 7.x and Player 3.x (see table below for the version numbers). The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2010-3277 to this issue. VMware would like to thank Alexander Trofimov and Marc Esher for independently reporting this issue to VMware. The following table lists what action remediates the vulnerability (column 4) if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not affected Workstation 7.x any 7.1.2 build 301548 or later * Workstation 6.5.x any not affected Player 3.x any 3.1.2 build 301548 or later * Player 2.5.x any not affected AMS any any not affected Server any any not affected Fusion any Mac OS/X not affected ESXi any ESXi not affected ESX any ESX not affected * Note: This only affects the installer, if you have a version of Workstation or Player installed you are not vulnerable. b. Third party libpng updated to version 1.2.44 A buffer overflow condition in libpng is addressed that could potentially lead to code execution with the privileges of the application using libpng. Two potential denial of service issues are also addressed in the update. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-1205, CVE-2010-0205, CVE-2010-2249 to these issues. The following table lists what action remediates the vulnerability (column 4) if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not affected Workstation 7.1.x any 7.1.2 build 301548 or later Workstation 6.5.x any affected, patch pending Player 3.1.x any 3.1.2 build 301548 or later Player 2.5.x any affected, patch pending AMS any any not affected Server any any affected, no patch planned Fusion any Mac OS/X not affected ESXi any ESXi not affected ESX any ESX not affected c. VMware ACE Management Server (AMS) for Windows updates Apache httpd version 2.2.15. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-0434 and CVE-2010-0425 to the issues addressed in this update. Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available. VMware Product Running Replace with/ Product Version on Apply Patch ============= ======== ======= ================= VirtualCenter any Windows not affected Workstation any any not affected Player any any not affected AMS any Windows 2.7.2 build 301548 or later AMS any Linux affected, patch pending * Server any any not affected Fusion any Mac OS/X not affected ESXi any ESXi not affected ESX any ESX not affected * Note CVE-2010-0425 is not applicable to AMS running on Linux 4. Solution Please review the patch/release notes for your product and version and verify the md5sum and/or the sha1sum of your downloaded file. VMware Workstation 7.1.2 ------------------------ http://www.vmware.com/download/ws/ Release notes: http://downloads.vmware.com/support/ws71/doc/releasenotes_ws712.html Workstation for Windows 32-bit and 64-bit with VMware Tools md5sum: 2e9715ec297dc3ca904ad2707d3e2614 sha1sum: 55b2b99f67c3dacd402fb9880999086efd264e7a Workstation for Windows 32-bit and 64-bit without VMware Tools md5sum: 066929f59aef46f11f4d9fd6c6b36e4d sha1sum: def776a28ee1a21b1ad26e836ae868551fff6fc3 VMware Player 3.1.2 ------------------- http://www.vmware.com/download/player/ Release notes: http://downloads.vmware.com/support/player31/doc/releasenotes_player312.html VMware Player for Windows 32-bit and 64-bit md5sum: 3f289cb33af5e425c92d8512fb22a7ba sha1sum: bf67240c1f410ebeb8dcb4f6d7371334bf9a6b70 VMware Player for Linux 32-bit md5sum: 11e3e3e8753e1d9abbbb92c4e3c1dfe8 sha1sum: dd1dbcdb1f4654eefc11472b68934dcb69842749 VMware Player for Linux 64-bit md5sum: 2ab08e0d4050719845a64d334ca15bb1 sha1sum: f024ad84ec831fce8667dfa9601851da5d9fa59c VMware ACE Management Server 2.7.2 ---------------------------------- http://downloads.vmware.com/d/info/desktop_downloads/vmware_ace/2_7 Release notes: http://downloads.vmware.com/support/ace27/doc/releasenotes_ace272.html ACE Management Server for Windows md5sum: 02f0072b8e48a98ed914b633f070d550 sha1sum: 94a68eac4a328d21a741879b9d063227c0dc1ce4 5. References CVE numbers http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3277 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0205 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2249 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0425 - ------------------------------------------------------------------------ 6. Change log 2010-09-23 VMSA-2010-0014 Initial security advisory after release of Workstation 7.1.2, Player 3.1.2 and ACE Management Server 2.7.2 on 2010-09-23 - ----------------------------------------------------------------------- 7. Contact E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: * security-announce at lists.vmware.com * bugtraq at securityfocus.com * full-disclosure at lists.grok.org.uk E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055 VMware Security Center http://www.vmware.com/security VMware Security Advisories http://www.vmware.com/security/advisoiries VMware security response policy http://www.vmware.com/support/policies/security_response.html General support life cycle policy http://www.vmware.com/support/policies/eos.html VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html Copyright 2010 VMware Inc. All rights reserved. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (MingW32) iEYEARECAAYFAkycSrQACgkQS2KysvBH1xmT9wCfbBUS4GYrJohz+QMLYcoiFmSh eTgAoIAmx+ilbe2myj02daLjFrVQfQII =5jlh -----END PGP SIGNATURE----- . =========================================================== Ubuntu Security Notice USN-908-1 March 10, 2010 apache2 vulnerabilities CVE-2010-0408, CVE-2010-0434 =========================================================== A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 8.04 LTS Ubuntu 8.10 Ubuntu 9.04 Ubuntu 9.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: apache2-common 2.0.55-4ubuntu2.10 Ubuntu 8.04 LTS: apache2.2-common 2.2.8-1ubuntu0.15 Ubuntu 8.10: apache2.2-common 2.2.9-7ubuntu3.6 Ubuntu 9.04: apache2.2-common 2.2.11-2ubuntu2.6 Ubuntu 9.10: apache2.2-common 2.2.12-1ubuntu2.2 In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: It was discovered that mod_proxy_ajp did not properly handle errors when a client doesn't send a request body. This issue affected Ubuntu 8.04 LTS, 8.10, 9.04 and 9.10. (CVE-2010-0408) It was discovered that Apache did not properly handle headers in subrequests under certain conditions. (CVE-2010-0434) Updated packages for Ubuntu 6.06 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.10.diff.gz Size/MD5: 132089 426096b5df2f66afdc5238e1a36ad7ae http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.10.dsc Size/MD5: 1159 89f54b0237d3770822f4dcfa62bfa873 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55.orig.tar.gz Size/MD5: 6092031 45e32c9432a8e3cf4227f5af91b03622 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.0.55-4ubuntu2.10_all.deb Size/MD5: 2126014 e9b8c902a850462498ab760300ff6cac amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.10_amd64.deb Size/MD5: 834550 7bfe05f8ccc35b49e8998bc75f114e44 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.10_amd64.deb Size/MD5: 229650 ebc761664f68ccd5805e63eaecc1fba6 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.10_amd64.deb Size/MD5: 224730 da6f9cd05b7a8feaa738a91d67f39c74 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.10_amd64.deb Size/MD5: 229224 e087b7f813d42f2622c5292ce30f1ffa http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.10_amd64.deb Size/MD5: 172968 37cfdc9dd428d96eb91e11c94edc4988 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.10_amd64.deb Size/MD5: 173760 3269814929d4a742c3aa4df43b125238 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.10_amd64.deb Size/MD5: 95562 782b22fdd2dca1031065c5d4d6fa6931 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.10_amd64.deb Size/MD5: 37614 448a6d1968f64595bb30644a50ec9dee http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.10_amd64.deb Size/MD5: 287158 882d910084c66b442bbdcd04643b67b2 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.10_amd64.deb Size/MD5: 145732 27844ce798fe5a89b0a612254a31a9ce i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.10_i386.deb Size/MD5: 787934 252a6dcbd54e8107a2e78faaa2cf233a http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.10_i386.deb Size/MD5: 204202 7859818455e0b7729e5c5a7b1351b824 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.10_i386.deb Size/MD5: 200134 dc6ecf58a2877af8233c2022ff26c193 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.10_i386.deb Size/MD5: 203674 4d1017b6964f5dba1baf3a8f6605659a http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.10_i386.deb Size/MD5: 172992 67ae3a23063006ba0c7b85996a216f0b http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.10_i386.deb Size/MD5: 173764 fcff9551d128201554386ca20b4cad04 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.10_i386.deb Size/MD5: 93528 61dcc7a007dd827c0853c43dd817a53c http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.10_i386.deb Size/MD5: 37610 1f5ef7a7233531c6ca3389103ad31081 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.10_i386.deb Size/MD5: 263174 cfb02840f6dfaaedbf6b3afc09781c53 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.10_i386.deb Size/MD5: 133598 417b4a1b229447ad9b3f4a6fcfb23de2 powerpc architecture (Apple Macintosh G3/G4/G5): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.10_powerpc.deb Size/MD5: 860642 48ff1bc6cb2f03809199402b276d3c79 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.10_powerpc.deb Size/MD5: 221616 ce06bf591c2af7dac0f21c64179b6b9f http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.10_powerpc.deb Size/MD5: 217250 854c8b46a495752ce561bc64f69926a6 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.10_powerpc.deb Size/MD5: 221100 6094b4cda7e06af45d46e82931037912 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.10_powerpc.deb Size/MD5: 172980 bf6bda9d816af33d521aef4d0d19d910 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.10_powerpc.deb Size/MD5: 173760 3ed3d7f93b21bf01acde0cda9f81e3f6 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.10_powerpc.deb Size/MD5: 105290 bab3bec77e0fd96f8f6d71a925c6c4a6 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.10_powerpc.deb Size/MD5: 37612 f950cac274a27ddd8c3e3ba0d51c6e67 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.10_powerpc.deb Size/MD5: 282738 fec6bcf82912a5eb03663ff9897a2730 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.10_powerpc.deb Size/MD5: 142828 7a5f915bc7c92ad390b1b84f02b05167 sparc architecture (Sun SPARC/UltraSPARC): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.10_sparc.deb Size/MD5: 805156 d9a317d7cd5165c41b311425c4cd227a http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.10_sparc.deb Size/MD5: 211746 08b1d3606bda53788af291b3b5848601 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.10_sparc.deb Size/MD5: 207470 8154c23c5caaceea57ee8350d829a78d http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.10_sparc.deb Size/MD5: 211134 65758f643c7bcc58881076faed925e43 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.10_sparc.deb Size/MD5: 172970 ba40003b159c9a955dfdd4dd45d30404 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.10_sparc.deb Size/MD5: 173748 856ec4539cb6137db9edd4abb623852e http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.10_sparc.deb Size/MD5: 94610 8420b4b80fb4e1a9fa39e4b04e12578a http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.10_sparc.deb Size/MD5: 37616 2b84d8a572d75fd4d3a10acfdecb8d0e http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.10_sparc.deb Size/MD5: 269164 1ee1afbfba811a082a82114ced122943 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.10_sparc.deb Size/MD5: 131556 ac64fc4b82792216551a68654da5aca7 Updated packages for Ubuntu 8.04 LTS: Source archives: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.15.diff.gz Size/MD5: 143511 9ae15355b3b33bfffd57b7c387a623af http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.15.dsc Size/MD5: 1382 c73a33ddb07551037f66f941f7c09f67 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8.orig.tar.gz Size/MD5: 6125771 39a755eb0f584c279336387b321e3dfc Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.8-1ubuntu0.15_all.deb Size/MD5: 1929148 986e20d917416ba04256f2b65f58af23 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.2.8-1ubuntu0.15_all.deb Size/MD5: 73044 8797cead9183b7b45e26a87f85c03a61 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-src_2.2.8-1ubuntu0.15_all.deb Size/MD5: 6258176 9ddd16e5a205eda2c6a15ec769a9e9ce http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.15_all.deb Size/MD5: 45970 f63af256575964b262bbb41999cc0a72 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.15_amd64.deb Size/MD5: 253208 84c7f752e5e232464ccf193902b39a77 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.15_amd64.deb Size/MD5: 248818 e5edc28f76ec94116740b83f7f8d76cd http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.15_amd64.deb Size/MD5: 252604 49e3c70c1f97daf2707ae3bf5f0e943f http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.15_amd64.deb Size/MD5: 205706 3b163e56ebd2f5992eef86803679dffd http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.15_amd64.deb Size/MD5: 206460 19cb7386cdf00c156f64b9f2c4bc1250 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.15_amd64.deb Size/MD5: 141812 38463dc035875bba573a420aeb78fc55 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.15_amd64.deb Size/MD5: 804224 7e23a2e17dfa6f8a37588b42c37590e9 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.15_i386.deb Size/MD5: 236194 5e191cc83788c2e66635413453771481 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.15_i386.deb Size/MD5: 231720 c079f54cbdb931cab220c8c587f3936b http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.15_i386.deb Size/MD5: 235446 f64813b7af3c9975d86b4c28892e759b http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.15_i386.deb Size/MD5: 205716 077591e2e4cdca278f2784f97ad3f8d3 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.15_i386.deb Size/MD5: 206484 51e99c350efa425ed768720c4c98313b http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.15_i386.deb Size/MD5: 140770 d328f36ab33f61f3157024501909a139 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.15_i386.deb Size/MD5: 755798 927a56f1405f1309893050ea9237f994 lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.15_lpia.deb Size/MD5: 235722 876be7a8737de0a515f21aa629a09d45 http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.15_lpia.deb Size/MD5: 231362 2078e50363d811291351a1c27bc58c0b http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.15_lpia.deb Size/MD5: 234856 0c7d564fd292dbc12b74de8a3484aab5 http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.15_lpia.deb Size/MD5: 205722 9eb8e1d684b3a96c93ff0f86cc709adb http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.15_lpia.deb Size/MD5: 206492 f340746f1893e25a720000bb560b0676 http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.15_lpia.deb Size/MD5: 141342 baeccaadd0e91b7045b7358a6c7cbda8 http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.15_lpia.deb Size/MD5: 749976 b83e2963384a68fe52faa734017b57d0 powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.15_powerpc.deb Size/MD5: 254284 d31f219bd5eda15bceb06bc9e25eabab http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.15_powerpc.deb Size/MD5: 249736 c66c5975b356db9cf6b42a042271c6e3 http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.15_powerpc.deb Size/MD5: 253842 5247b89584455be5623c404b24796cec http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.15_powerpc.deb Size/MD5: 205728 58d1431d486459d641db835ad4a35fc2 http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.15_powerpc.deb Size/MD5: 206490 a722a8aa18f08ab19ab127dfda9443a7 http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.15_powerpc.deb Size/MD5: 158536 47458a0cbd6cfa4bdc06e97d67741e75 http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.15_powerpc.deb Size/MD5: 906298 aeccf21a452a6fe9c369ebb2b0b04a4e sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.15_sparc.deb Size/MD5: 237516 4326c5061f9c765db5d0bcc01e1669be http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.15_sparc.deb Size/MD5: 233278 0d5babd2b04b62bad540b8ee17fbe06e http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.15_sparc.deb Size/MD5: 236708 f6699f5dfaf29a1eaecf637e9fdcbdf0 http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.15_sparc.deb Size/MD5: 205724 da2a97a28c9c2914c55ccc1606ae77e9 http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.15_sparc.deb Size/MD5: 206490 9ac523aa40acc889678392b2f061725f http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.15_sparc.deb Size/MD5: 143976 7cc95b10718a6252dc6fa8cc58045192 http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.15_sparc.deb Size/MD5: 765616 5f1cca257dcce7bb56fe342236b9ea1b Updated packages for Ubuntu 8.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9-7ubuntu3.6.diff.gz Size/MD5: 139326 10707e14c87b5b776a073113a94c6a1b http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9-7ubuntu3.6.dsc Size/MD5: 1789 74082691bed2864c646f3a8ac3a16eb4 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9.orig.tar.gz Size/MD5: 6396996 80d3754fc278338033296f0d41ef2c04 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.9-7ubuntu3.6_all.deb Size/MD5: 2041858 706b343b84044f2f532e0941ee93ff03 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-src_2.2.9-7ubuntu3.6_all.deb Size/MD5: 6537860 6a767abce0dd1e61107a459fbf029691 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9-7ubuntu3.6_all.deb Size/MD5: 45626 84e04ec49010cfac41f939c27b9c9a31 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.6_amd64.deb Size/MD5: 255130 68f5cf8b5548d407b51d6db614c6b9b2 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.6_amd64.deb Size/MD5: 249326 796985e36b4ad3423909947fcca71966 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.6_amd64.deb Size/MD5: 254478 45e12d6d18cadeb552888ca1395a81c4 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.6_amd64.deb Size/MD5: 208652 63e0d760fcaf0bd82a661336fe39cae6 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.6_amd64.deb Size/MD5: 84610 8a594fba559844dba85496f60e84b7f7 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.6_amd64.deb Size/MD5: 82966 6becc4c35b209a8a09a9715f9e8f44f0 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.6_amd64.deb Size/MD5: 209682 b28ea955f642c5a9cd3854da82843ef0 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.6_amd64.deb Size/MD5: 147882 b83148d248dbb4ac13fd57db5ce2650c http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.6_amd64.deb Size/MD5: 820544 934937ebb87e765ada13608b50b2bd84 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.6_i386.deb Size/MD5: 241500 53f66d0add4830740f819855f679ad0e http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.6_i386.deb Size/MD5: 236122 50550a1af2dfb61ac9da7e28367c036e http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.6_i386.deb Size/MD5: 240782 6d9798847ab81e1d565f1be057a4626e http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.6_i386.deb Size/MD5: 208662 d1f85491999b1c89f4fbe3c523c854e1 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.6_i386.deb Size/MD5: 84042 470d82a4b6a25286ac4b21f6e59dd373 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.6_i386.deb Size/MD5: 82444 ecf0e6f5465f9f9e38058e756891c8fe http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.6_i386.deb Size/MD5: 209682 72e627fd62be2175f1caf6979aa33528 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.6_i386.deb Size/MD5: 146726 09954f0d419252bba5a954c4a749c56d http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.6_i386.deb Size/MD5: 778764 0cbf3c7a7d0fcb2cdf4c15239c7c9ab7 lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.6_lpia.deb Size/MD5: 238456 c307976b4b9dda8e908db9aab888487f http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.6_lpia.deb Size/MD5: 233076 df1ab53d9ba76510482ea9e81e0c05ed http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.6_lpia.deb Size/MD5: 237732 d7a685c6e7c7f85e4596e446c5f81116 http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.6_lpia.deb Size/MD5: 208660 dad1c46c1e379ad508874730419357c1 http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.6_lpia.deb Size/MD5: 83998 70e9d64a0b2003a3431af50686dbb3a9 http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.6_lpia.deb Size/MD5: 82426 14ba830d1f933a00e49bfcb834f01333 http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.6_lpia.deb Size/MD5: 209688 e2ad15523a015b78aa1d79a457977f6f http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.6_lpia.deb Size/MD5: 146418 2ea6c8dd9e2e67ca9ca01b5368e8a492 http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.6_lpia.deb Size/MD5: 766738 939fd23c53ad2e3856950b539c49e572 powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.6_powerpc.deb Size/MD5: 261634 1fd498222280f99f3baa05e76b8b3134 http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.6_powerpc.deb Size/MD5: 256204 ddb9aebbba56b1247d744c24d620c311 http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.6_powerpc.deb Size/MD5: 260994 18d27f39cb23053b475b9c797ed4a0b9 http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.6_powerpc.deb Size/MD5: 208672 a63ee94b91522612a0d9baf8cf8be1e9 http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.6_powerpc.deb Size/MD5: 84694 442e717226809ef8450ec6640d985165 http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.6_powerpc.deb Size/MD5: 83042 075c585197c7424b0f075791c26d7fff http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.6_powerpc.deb Size/MD5: 209692 5f3226ac36647403501e70aea30ae295 http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.6_powerpc.deb Size/MD5: 161152 f5aef8d2db2ce2f0a61610d220b8554f http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.6_powerpc.deb Size/MD5: 926422 6ee1f22222dc895c7d4e90a22c6e82e4 sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.6_sparc.deb Size/MD5: 246832 44d9328891ed6a5b27b8b7ca17dd1e65 http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.6_sparc.deb Size/MD5: 241392 3132cdcdd9ff2390f33c004ba0d06c25 http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.6_sparc.deb Size/MD5: 246146 a22417d0af89d571057186566cba70d6 http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.6_sparc.deb Size/MD5: 208658 3a9623afdc7080fdd8ed7571ec44f93b http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.6_sparc.deb Size/MD5: 84230 23a679c07ac52f14db5d5502c797fbe0 http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.6_sparc.deb Size/MD5: 82596 58f1b8c280a18ff5714fcde8f31bb767 http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.6_sparc.deb Size/MD5: 209684 7d0b63fc5c72b67fb67056f75003507d http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.6_sparc.deb Size/MD5: 151052 bc015d14efdd9b781416fcd4dcbaf3da http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.6_sparc.deb Size/MD5: 784092 3d4f997fd5cb3372e23e7a7b5b33a818 Updated packages for Ubuntu 9.04: Source archives: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.6.diff.gz Size/MD5: 142681 9290c7aa5d38184a259ed1e8b31f302e http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.6.dsc Size/MD5: 1796 c92dc8b9df72439a68fb9acabe825d34 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11.orig.tar.gz Size/MD5: 6806786 03e0a99a5de0f3f568a0087fb9993af9 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.11-2ubuntu2.6_all.deb Size/MD5: 2219398 a59488ae00cefb2d9e763986951b46f7 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.6_all.deb Size/MD5: 46768 d4959ab1a2fcac6febf73d72af47c8ea http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-src_2.2.11-2ubuntu2.6_all.deb Size/MD5: 6948418 f6ad43ce72bed437112d0474764c4e72 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.6_amd64.deb Size/MD5: 259164 b493228cb147781d7ae20e832a859c6e http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.6_amd64.deb Size/MD5: 253356 111e4f5738a5c1d25a4c0539dfb3eb01 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.6_amd64.deb Size/MD5: 258546 953c300480822f9bba76921a551342ff http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.6_amd64.deb Size/MD5: 213416 9a208bf91694f084f124f7cdb7086ae5 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.6_amd64.deb Size/MD5: 214372 5c138ead01971ef4e25c6f2fc4a8c081 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.6_amd64.deb Size/MD5: 151268 c10773d75fc13a933af172f8c25ed928 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.6_amd64.deb Size/MD5: 827176 9c5f22af93970e386b3392ea6496012a http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.6_amd64.deb Size/MD5: 87926 053a597373bfafedc54c7f56bbc4d36f http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.6_amd64.deb Size/MD5: 86272 99845d4c0c7e1fb6106e12ef89d6b1de i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.6_i386.deb Size/MD5: 245642 a4975d08a72dbbc7a0c9a1ecb467a625 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.6_i386.deb Size/MD5: 240198 2c67ecad0ff90d9c3cac969c69cc6403 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.6_i386.deb Size/MD5: 245072 cc06f54e8e72c9ef88f18c637258c296 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.6_i386.deb Size/MD5: 213426 5692c703a7442e93cd6c201d0b784609 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.6_i386.deb Size/MD5: 214390 22e7a59f09641e26a56398e8165548a4 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.6_i386.deb Size/MD5: 150168 7c2dc8f846d3d11985fb4ea4c9e40714 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.6_i386.deb Size/MD5: 784518 23be691c35729ab36f7764aeb02ef4c1 http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.6_i386.deb Size/MD5: 87310 2af044869390444fa21197f6bde2c8f0 http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.6_i386.deb Size/MD5: 85706 4814c65a1b0da47ee4c5189b68956890 lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.6_lpia.deb Size/MD5: 242526 0ccc9efc179daa8a3994818daf5d962f http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.6_lpia.deb Size/MD5: 237034 979638ca12fef068895ca14d40adf1fe http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.6_lpia.deb Size/MD5: 241914 2e5438ad43673a0b0467946a3904f883 http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.6_lpia.deb Size/MD5: 213426 fc47493b35308f26cf370d5fc36a764c http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.6_lpia.deb Size/MD5: 214396 e591f754bfef0e3f097db8f234aef1c4 http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.6_lpia.deb Size/MD5: 149888 5ff213998d0756589eb12387ec99d53e http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.6_lpia.deb Size/MD5: 773726 d3347559226812470d87af62e3be7a53 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.6_lpia.deb Size/MD5: 87248 cd0c669ff56ada0d600dd7f62c3ab406 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.6_lpia.deb Size/MD5: 85680 6d064bc67f5a528ed3c9aa0f251d536d powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.6_powerpc.deb Size/MD5: 265602 dd914e1e1392318a1efff84fef689fb4 http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.6_powerpc.deb Size/MD5: 260618 78b8f50bab2b0e4fed67b49b9a2f34ec http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.6_powerpc.deb Size/MD5: 265262 05581b19a7ad11ac34237065447137ea http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.6_powerpc.deb Size/MD5: 213440 17d41a63c07a53b6a47e8ddbaafde343 http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.6_powerpc.deb Size/MD5: 214406 df3a389b1a92f641b6baed063420f71e http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.6_powerpc.deb Size/MD5: 164580 259b63754f6f73dbd2857356c04a959a http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.6_powerpc.deb Size/MD5: 932678 86c9127387640b057ea9e0fdf50a6b40 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.6_powerpc.deb Size/MD5: 88008 4aabc23270af1875dd1798e21e5ecf41 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.6_powerpc.deb Size/MD5: 86280 6d918a123609e62508baea60fd579ee9 sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.6_sparc.deb Size/MD5: 250926 080921e0439dd8c221d6fe92ef246e86 http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.6_sparc.deb Size/MD5: 245236 0cd80a701c6e21d779840e590380f60e http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.6_sparc.deb Size/MD5: 250252 d3510ceebeb7a254dc61d2e37cfb8232 http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.6_sparc.deb Size/MD5: 213440 50fdbf9ec8d08e9fab9df4352a702703 http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.6_sparc.deb Size/MD5: 214412 519c15df22f7ff3da1391ddbed717f21 http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.6_sparc.deb Size/MD5: 154426 ca9003b8a71bbbe73328af4fc0e4428d http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.6_sparc.deb Size/MD5: 789462 085ceebc571d99f2528891fd138266f7 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.6_sparc.deb Size/MD5: 87510 2a8052e30ece8670fcd7b5b5cc444adb http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.6_sparc.deb Size/MD5: 85860 ea55b592d9b4c45cd94af4836961f9e0 Updated packages for Ubuntu 9.10: Source archives: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.12-1ubuntu2.2.diff.gz Size/MD5: 185966 1fd1b39b8acae8efd95cfba73035ef5d http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.12-1ubuntu2.2.dsc Size/MD5: 1889 f259c015de981d3f9e6ba6652e89ef53 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.12.orig.tar.gz Size/MD5: 6678149 17f017b571f88aa60abebfe2945d7caf Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.12-1ubuntu2.2_all.deb Size/MD5: 2246764 243a32914d322c363e8181f4e609eaee http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.12-1ubuntu2.2_all.deb Size/MD5: 2344 d4a431e66497ad75c6c76ef16b94337f http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.12-1ubuntu2.2_all.deb Size/MD5: 2376 47b97a23cf9be3fbbda7d4d33b0203f9 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.12-1ubuntu2.2_all.deb Size/MD5: 2314 bf4f9dccdb1eb33ef9dde9e845ea69f4 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.12-1ubuntu2.2_all.deb Size/MD5: 285202 04dcce263dc86b401d1341f95fe25906 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.12-1ubuntu2.2_all.deb Size/MD5: 1426 0a27231773121ea4ed159283ae664f94 http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-mpm-itk_2.2.12-1ubuntu2.2_all.deb Size/MD5: 2372 df8f7e39a1be46de7e96df5da2013af3 amd64 architecture (Athlon64, Opteron, EM64T Xeon): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.12-1ubuntu2.2_amd64.deb Size/MD5: 137082 192e416bdda75ce8c45c5207c7f6b975 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.12-1ubuntu2.2_amd64.deb Size/MD5: 138190 d0e2523df5544601e824d9d6d34eca23 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.12-1ubuntu2.2_amd64.deb Size/MD5: 156784 27d845ebfc48e6935f2b213c9140bb6e http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-bin_2.2.12-1ubuntu2.2_amd64.deb Size/MD5: 1399724 12708155a417a9d090380907d15411ec http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.12-1ubuntu2.2_amd64.deb Size/MD5: 92644 887937b07afcc3701bc66a1640ac8733 http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.12-1ubuntu2.2_amd64.deb Size/MD5: 91024 6d34a77de75b7152327ceb73775b3915 i386 architecture (x86 compatible Intel/AMD): http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.12-1ubuntu2.2_i386.deb Size/MD5: 137092 126e3c92ab8652016340d39f9d223f59 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.12-1ubuntu2.2_i386.deb Size/MD5: 138188 31da570017edbce3f6f34628e5d36fa8 http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.12-1ubuntu2.2_i386.deb Size/MD5: 155324 0cff520071def0ae1cd458fbb354683f http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-bin_2.2.12-1ubuntu2.2_i386.deb Size/MD5: 1309290 3ce857da081471731f401a08e02daa21 http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.12-1ubuntu2.2_i386.deb Size/MD5: 92028 f60d21f5b476f5c9e9a3886acf7a1385 http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.12-1ubuntu2.2_i386.deb Size/MD5: 90466 d04da6a2077f9c40796266107c84e747 lpia architecture (Low Power Intel Architecture): http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.12-1ubuntu2.2_lpia.deb Size/MD5: 137090 85e576764c7e72449a1229feacbc3a1d http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.12-1ubuntu2.2_lpia.deb Size/MD5: 138206 b4d5ac7685535fab17c694233f894f83 http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.12-1ubuntu2.2_lpia.deb Size/MD5: 155242 c03cb87555975f754c34537084c374b2 http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-bin_2.2.12-1ubuntu2.2_lpia.deb Size/MD5: 1290654 88629a149a84206ca6e37ee1ce4923a3 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.12-1ubuntu2.2_lpia.deb Size/MD5: 91978 d114a24e4ba510f72b7b7c721b8a7376 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.12-1ubuntu2.2_lpia.deb Size/MD5: 90466 a4d405b139bc75e526807eadd473dc49 powerpc architecture (Apple Macintosh G3/G4/G5): http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.12-1ubuntu2.2_powerpc.deb Size/MD5: 137088 c316a4af0913e33aaadb3621702118f3 http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.12-1ubuntu2.2_powerpc.deb Size/MD5: 138192 f9100a53b31914b16dda8ff5f9afb218 http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.12-1ubuntu2.2_powerpc.deb Size/MD5: 161188 2296d3ec6e45bb715e9d918df985b36c http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-bin_2.2.12-1ubuntu2.2_powerpc.deb Size/MD5: 1390306 8e8c87274ae72fce5d1911ff05a20e2a http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.12-1ubuntu2.2_powerpc.deb Size/MD5: 92552 1a28d81a25546498dbbbfaf0d0e929bf http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.12-1ubuntu2.2_powerpc.deb Size/MD5: 90918 e368a1ac77fc510630f1696f25268ac3 sparc architecture (Sun SPARC/UltraSPARC): http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.12-1ubuntu2.2_sparc.deb Size/MD5: 137098 259de5ac6919ba28eef8f8c3bdbb5ae0 http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.12-1ubuntu2.2_sparc.deb Size/MD5: 138198 106dfdd3820957cd12d23d9ff14cabf8 http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.12-1ubuntu2.2_sparc.deb Size/MD5: 159640 41e05eb97a5e5f2682636b124a52970f http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-bin_2.2.12-1ubuntu2.2_sparc.deb Size/MD5: 1298086 5c7ddce4dc35f6ea81e73b7797b091c7 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.12-1ubuntu2.2_sparc.deb Size/MD5: 92318 89e113250f9925383eb4cd2ac0941d58 http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.12-1ubuntu2.2_sparc.deb Size/MD5: 90708 f7094a69d4607bd77e24d02559b07aab . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ Debian Security Advisory DSA-2035-1 security@debian.org http://www.debian.org/security/ Stefan Fritsch April 17, 2010 http://www.debian.org/security/faq - ------------------------------------------------------------------------ Package : apache2 Vulnerability : multiple issues Problem type : remote Debian-specific: no CVE Id(s) : CVE-2010-0408 CVE-2010-0434 Two issues have been found in the Apache HTTPD web server: CVE-2010-0408 mod_proxy_ajp would return the wrong status code if it encountered an error, causing a backend server to be put into an error state until the retry timeout expired. A remote attacker could send malicious requests to trigger this issue, resulting in denial of service. CVE-2010-0434 A flaw in the core subrequest process code was found, which could lead to a daemon crash (segfault) or disclosure of sensitive information if the headers of a subrequest were modified by modules such as mod_headers. For the stable distribution (lenny), these problems have been fixed in version 2.2.9-10+lenny7. For the testing distribution (squeeze) and the unstable distribution (sid), these problems have been fixed in version 2.2.15-1. This advisory also provides updated apache2-mpm-itk packages which have been recompiled against the new apache2 packages. We recommend that you upgrade your apache2 and apache2-mpm-itk packages. Upgrade instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 5.0 alias lenny (stable) - ----------------------------------------- Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. - From the apache2 source package: Source archives: http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny7.dsc Size/MD5 checksum: 1682 58737d2f0024a178d40db6f9356e5b6a http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny7.diff.gz Size/MD5 checksum: 147059 f599c83adbced41a7339524c512ae0cd http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9.orig.tar.gz Size/MD5 checksum: 6396996 80d3754fc278338033296f0d41ef2c04 Architecture independent packages: http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny7_all.deb Size/MD5 checksum: 45366 9f02e6acd2828a7cfcb5c9e4866ab120 http://security.debian.org/pool/updates/main/a/apache2/apache2-doc_2.2.9-10+lenny7_all.deb Size/MD5 checksum: 2060854 5b1f6debc65b7ca2ae8156b21f0d0597 http://security.debian.org/pool/updates/main/a/apache2/apache2-src_2.2.9-10+lenny7_all.deb Size/MD5 checksum: 6737126 afec2194fa17efb6e4096c1019936cd0 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_alpha.deb Size/MD5 checksum: 148012 8ecfd6794861e9e3d6978da82bc2cefe http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_alpha.deb Size/MD5 checksum: 849168 55f719672e65f8d4fd8d5e636ce699fc http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_alpha.deb Size/MD5 checksum: 84550 be00c04e09e2674ac29698b375cf929a http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_alpha.deb Size/MD5 checksum: 261782 b1033eed4f6ef387ba40a9e47f22b55f http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_alpha.deb Size/MD5 checksum: 2402612 88e34405726dc0db8dc6fa08fe9d3015 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_alpha.deb Size/MD5 checksum: 262442 bd016288cc237eb634fb192495e82497 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_alpha.deb Size/MD5 checksum: 209852 4bdaa051f16395f975ae9e23f20656cd http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_alpha.deb Size/MD5 checksum: 208812 b81f75539975f5ce8d9d963d80db736d http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_alpha.deb Size/MD5 checksum: 256700 edfa8a0cbf63cab6a556c4dd27469774 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_alpha.deb Size/MD5 checksum: 82844 e30731c8d0d35915b89c971d8f75d601 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_amd64.deb Size/MD5 checksum: 210460 5d06fbdfb55a1df8dbcba748863979ae http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_amd64.deb Size/MD5 checksum: 253932 48d0d2c1809442bc8156b2cfc8479833 http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_amd64.deb Size/MD5 checksum: 2474402 297cc14e46752a0eaa74c51745f1b167 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_amd64.deb Size/MD5 checksum: 825742 b6c41005aa6023fd6b8e46a2c2bb54d8 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_amd64.deb Size/MD5 checksum: 211780 5b708928d5ccdd153a133696b0c2f634 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_amd64.deb Size/MD5 checksum: 257998 2f673a0130221479fda2744754886983 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_amd64.deb Size/MD5 checksum: 144544 6f5b0f0b1771560d2c03d9656a29fff5 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_amd64.deb Size/MD5 checksum: 83122 3d1320b8034c5a264fafe1abda73519a http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_amd64.deb Size/MD5 checksum: 258520 c87fc981aa02f36ae6c11ae4864956de http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_amd64.deb Size/MD5 checksum: 84794 e4fc458a59f5752c1f42c78b6fa987f5 arm architecture (ARM) http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_arm.deb Size/MD5 checksum: 224742 ad1a76d935c9556154813b9522dc6bed http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_arm.deb Size/MD5 checksum: 788804 f5f761306f86bb4d184079ed955c5976 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_arm.deb Size/MD5 checksum: 221026 0298c56590af4130f885c7fa310ea37d http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_arm.deb Size/MD5 checksum: 213052 7e5d2451da332850ce1023e7c378d10a http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_arm.deb Size/MD5 checksum: 214146 f86977fe84b12fe8023e9bfbb511102a http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_arm.deb Size/MD5 checksum: 147688 300f2873dad2d5913c9b8263576719f2 http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_arm.deb Size/MD5 checksum: 2338672 a06089d9f0c9cf6d4e3a79d3042580c1 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_arm.deb Size/MD5 checksum: 84248 35162b0a8a48282954ba150f19693d33 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_arm.deb Size/MD5 checksum: 82516 9cd27238e0ec866f8dba6005006dc6b9 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_arm.deb Size/MD5 checksum: 225298 962f8f913a6e3c1dcd15987c3d0d8c9b armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_armel.deb Size/MD5 checksum: 226470 2640d070ec26b2973f12e50004187430 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_armel.deb Size/MD5 checksum: 222010 f0530b25b7e6b471aa97cc8ec86e735d http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_armel.deb Size/MD5 checksum: 212630 1dcb5bed6c6d3e91d17407cc456cc3d6 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_armel.deb Size/MD5 checksum: 151358 59ecc9ecda664b7a8f401fbf62cf3982 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_armel.deb Size/MD5 checksum: 213756 e178ec6db09bf648f0ec63f00486fc4a http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_armel.deb Size/MD5 checksum: 2340908 74e02e41ebb2439d902a14f905688be3 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_armel.deb Size/MD5 checksum: 82404 baa982a3b2940ffdc73130536d29fd00 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_armel.deb Size/MD5 checksum: 84052 4b68dc6b80635d9b2bc7677dd087386e http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_armel.deb Size/MD5 checksum: 802876 b35c7bbe91e1b92d701435dfed0b5736 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_armel.deb Size/MD5 checksum: 226188 c1395ebd59cf917f202de0a1783770d3 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_hppa.deb Size/MD5 checksum: 2384952 fc3cfd3a3295212ef11e81f8dafd6334 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_hppa.deb Size/MD5 checksum: 246522 3e02003e50bcfbb80ebf759fdd940c66 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_hppa.deb Size/MD5 checksum: 245948 2f5dd3734ad765775a32a797850e33ec http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_hppa.deb Size/MD5 checksum: 84164 46b37167fbef173aa29d8a0883be5fac http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_hppa.deb Size/MD5 checksum: 896872 55bb18bae73b60e8b982111c56b101bc http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_hppa.deb Size/MD5 checksum: 153148 bd52450b076b8f55d0095112e733cd8c http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_hppa.deb Size/MD5 checksum: 82416 fa04a87df2de26ec8259bf70e5e8d926 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_hppa.deb Size/MD5 checksum: 213134 2dd0368d2b94941264e55b8b3f20857f http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_hppa.deb Size/MD5 checksum: 241646 dc2e2b09a0c72ff0e01ba136dfefa856 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_hppa.deb Size/MD5 checksum: 211854 d83149e56efd9c074b32c961a6272b23 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_i386.deb Size/MD5 checksum: 238526 97ff922ee6bf6c19cee164794630256d http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_i386.deb Size/MD5 checksum: 210052 34369451ba65d4a734034a0dfba31345 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_i386.deb Size/MD5 checksum: 211200 a4da7ec33873626b51191c56a5974e8b http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_i386.deb Size/MD5 checksum: 82508 b6443c6a2c94a2ef8627802c0a0cbaa3 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_i386.deb Size/MD5 checksum: 242016 13be25ca0b28f708a0defd5225d1d1d7 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_i386.deb Size/MD5 checksum: 782932 4b5e5364b62eda87bffb60f5bb37f04e http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_i386.deb Size/MD5 checksum: 84238 c43d713e364322ddb3af3bcaf0e4de9d http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_i386.deb Size/MD5 checksum: 241622 1293d06d3a572a5d0e4e96f201cf32c0 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_i386.deb Size/MD5 checksum: 146222 75ce464a2e479e4806dd55926143be47 http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_i386.deb Size/MD5 checksum: 2317652 69ccff7beaa71326022cbc06d41fcfa5 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_ia64.deb Size/MD5 checksum: 83682 f31ab5b2b2e52571a13e57fe76e131fc http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_ia64.deb Size/MD5 checksum: 2319396 b212a76ab3692819f9038c48163423c0 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_ia64.deb Size/MD5 checksum: 85694 8ee80e22226a42cf7026e805ae1fc3ba http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_ia64.deb Size/MD5 checksum: 303620 4c60aef451289494b86068d3554ebc42 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_ia64.deb Size/MD5 checksum: 311254 3cdb05084df1bc4aca51152aa30fa278 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_ia64.deb Size/MD5 checksum: 312292 70f294dc7cb432ace777ed43cb91ca4b http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_ia64.deb Size/MD5 checksum: 1038294 591ffdeebd2f55f2462de2076c509878 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_ia64.deb Size/MD5 checksum: 209912 e0e96ce793583af713f59c5e10c6de80 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_ia64.deb Size/MD5 checksum: 163266 23277a351e4b1560d715dc57f1b7701a http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_ia64.deb Size/MD5 checksum: 208830 f8953d6f26e275b28ffcc7e3189c98e3 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_mips.deb Size/MD5 checksum: 229742 c4f54d969a0a202f03ccd1508664bc9c http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_mips.deb Size/MD5 checksum: 210200 b787622b559b2283a5627577f6a674dc http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_mips.deb Size/MD5 checksum: 233314 21767ab217dc89d701235342e5131f79 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_mips.deb Size/MD5 checksum: 793674 2701365a1cf8a0431a587db97936145d http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_mips.deb Size/MD5 checksum: 2492036 3e8cb9a08b422dd062461e959df1c8cd http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_mips.deb Size/MD5 checksum: 211322 5d2769bfe8182bdbbf9854c3fee80376 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_mips.deb Size/MD5 checksum: 152188 22f386ca6335b4af7c3210da76f306d9 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_mips.deb Size/MD5 checksum: 82576 7dc12e73fed40a5d8bc5784cddfdadf8 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_mips.deb Size/MD5 checksum: 233976 4481891d78d49539d029eca1928a716c http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_mips.deb Size/MD5 checksum: 84198 e46b26c2efa7f439aee81000f750b12d mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_mipsel.deb Size/MD5 checksum: 232250 495c2e976772a7c2e4a711908ff31a0c http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_mipsel.deb Size/MD5 checksum: 209870 ef6cfcd63e072cc47b368f6ed7153281 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_mipsel.deb Size/MD5 checksum: 208844 7b2d354c6ef23a33977561518c66676a http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_mipsel.deb Size/MD5 checksum: 779224 d2b383edaba6ee943872c6a8099fc722 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_mipsel.deb Size/MD5 checksum: 83834 bc7152c16e202516cbe475c19be39e7f http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_mipsel.deb Size/MD5 checksum: 228206 6222f49c5a6ce469d38b1027c552cb8e http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_mipsel.deb Size/MD5 checksum: 2421350 e2b868f3aefc3aed746aba0770473f30 http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_mipsel.deb Size/MD5 checksum: 150218 e37c40c73f8bd7c8b93a4281c832648c http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_mipsel.deb Size/MD5 checksum: 82252 8e90c947c9e6c7ae38b17fe706a9a11a http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_mipsel.deb Size/MD5 checksum: 232940 335201394e1c507909e3663be2b3b5ba powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_powerpc.deb Size/MD5 checksum: 254146 a4e1c794bcceef63b264aaaac6d67fd6 http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_powerpc.deb Size/MD5 checksum: 2513082 5d896ec8ef209fcda5742a1a9ec200d7 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_powerpc.deb Size/MD5 checksum: 928912 ff0ea38f535697f81105d9bb2b07e2be http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_powerpc.deb Size/MD5 checksum: 258590 48435b265870f9a5beaea30db05de8ec http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_powerpc.deb Size/MD5 checksum: 83644 0b811450f6b2804d38e3fe4686078084 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_powerpc.deb Size/MD5 checksum: 259404 693ac4132feb7dd1a52971371ecd56d1 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_powerpc.deb Size/MD5 checksum: 85332 7e755948550dfbce7d6525388a8b5b9f http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_powerpc.deb Size/MD5 checksum: 212826 59d76ffc9981fabf770ee407a27af52a http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_powerpc.deb Size/MD5 checksum: 161298 d6a7dc59a2d2554ef51783fab9fb0c15 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_powerpc.deb Size/MD5 checksum: 211768 d691e724c006564585b0175eb67f291c s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_s390.deb Size/MD5 checksum: 260994 a839172525a323cad3d0879d1ff89210 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_s390.deb Size/MD5 checksum: 84792 ff59eafc0f68f90776fb940733d933f7 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_s390.deb Size/MD5 checksum: 843642 ac1abdcc444471bf5503bdefb4e59c4f http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_s390.deb Size/MD5 checksum: 2429228 b4f680c4a7aaa90f7eadcc01928ce710 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_s390.deb Size/MD5 checksum: 256712 18e714b8f5ef70e9c396caca6d7ce698 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_s390.deb Size/MD5 checksum: 211236 929c4f162f963423b4233ca6439586e6 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_s390.deb Size/MD5 checksum: 83070 1e1ec69bf9e2839c3db02033f6b1ca89 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_s390.deb Size/MD5 checksum: 261668 3213f36030783167b4c0300834a682dd http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_s390.deb Size/MD5 checksum: 212240 1abc24eb70132596c0b076db8cf0c2db http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_s390.deb Size/MD5 checksum: 150732 1bfc74bf4dc77c53cf31e60e94aa28cb sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_sparc.deb Size/MD5 checksum: 145952 f665453436258bb0d921229808e5ee87 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_sparc.deb Size/MD5 checksum: 82862 39ea998f8c0db9567910a7d5e934a2c5 http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_sparc.deb Size/MD5 checksum: 784222 013f896249de3f01408300e337c36b49 http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_sparc.deb Size/MD5 checksum: 211916 2be53e81254cd2a7d83b7c1bd9bac1d1 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_sparc.deb Size/MD5 checksum: 241270 99365a7e4a516b8427253bac3ce69a44 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_sparc.deb Size/MD5 checksum: 240778 f61fd467b85116b45c87cc48931861a1 http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_sparc.deb Size/MD5 checksum: 84606 ed8d2bfc1cec31ff3c638ae8f892d6d0 http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_sparc.deb Size/MD5 checksum: 213132 df1fab5a87a80e0e66b80d50086dc218 http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_sparc.deb Size/MD5 checksum: 2233030 ac06cea995c866a6fd27a8922d2bd5d7 http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_sparc.deb Size/MD5 checksum: 237138 7ad176ecb1f799f6a954afd9ee1a31e8 - From the apache2-mpm-itk source package: alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b4_alpha.deb Size/MD5 checksum: 198270 37511ff523c00dfd94686da9c4ed1ad7 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_amd64.deb Size/MD5 checksum: 195222 9764e5a1bcdf1501381c5cb22d1101db arm architecture (ARM) http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_arm.deb Size/MD5 checksum: 161916 6d9216fb6195f975464391c366d5d6eb armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_armel.deb Size/MD5 checksum: 162904 9035f96ad7ec223298f256129a5f4fba hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_hppa.deb Size/MD5 checksum: 183304 306d679dc522570254dcaa81b3105e73 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_i386.deb Size/MD5 checksum: 178986 b955efd13a0734596a0b936913d564b2 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_ia64.deb Size/MD5 checksum: 247228 3a115bf303067a8c29d2ec127a7ccc56 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_mips.deb Size/MD5 checksum: 171054 a118f468ac32c7d2388fd98b98e8fffe mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_mipsel.deb Size/MD5 checksum: 169500 90ac7e587508c02e3a0aac3d29087f7f powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_powerpc.deb Size/MD5 checksum: 195234 914bb47b1c30dcb494a713ee17125b69 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_s390.deb Size/MD5 checksum: 197564 be5c1c16a345935ad5a8e1fc299301e5 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_sparc.deb Size/MD5 checksum: 177732 acce311a9354b32da0b6d7f8f0255f70 These files will probably be moved into the stable distribution on its next update. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 4.14

sources: NVD: CVE-2010-0434 // CERT/CC: VU#280613 // JVNDB: JVNDB-2010-001174 // JVNDB: JVNDB-2011-001633 // BID: 38580 // BID: 38494 // VULMON: CVE-2010-0434 // PACKETSTORM: 114141 // PACKETSTORM: 86860 // PACKETSTORM: 94244 // PACKETSTORM: 87107 // PACKETSTORM: 88619

AFFECTED PRODUCTS

vendor:apachemodel:http serverscope:ltversion:2.0.64

Trust: 1.8

vendor:apachemodel:http serverscope:ltversion:2.2.15

Trust: 1.8

vendor:hitachimodel:web serverscope: - version: -

Trust: 1.6

vendor:debianmodel:linuxscope:eqversion:5.0

Trust: 1.3

vendor:oraclemodel:http serverscope:eqversion:10.1.3.5.0

Trust: 1.1

vendor:ibmmodel:http serverscope:eqversion:7.0

Trust: 1.1

vendor:ibmmodel:websphere application serverscope:eqversion:7.0

Trust: 1.1

vendor:debianmodel:linuxscope:eqversion:6.0

Trust: 1.0

vendor:apachemodel:http serverscope:gteversion:2.2.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:11

Trust: 1.0

vendor:apachemodel:http serverscope:gteversion:2.0.35

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:13

Trust: 1.0

vendor:apache http servermodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel:http serverscope:eqversion:2.0.47.x

Trust: 0.8

vendor:ibmmodel:http serverscope:eqversion:6.0

Trust: 0.8

vendor:ibmmodel:http serverscope:eqversion:6.1

Trust: 0.8

vendor:applemodel:mac os xscope:eqversion:v10.6 to v10.6.4

Trust: 0.8

vendor:applemodel:mac os x serverscope:eqversion:v10.6 to v10.6.4

Trust: 0.8

vendor:oraclemodel:opensolarisscope: - version: -

Trust: 0.8

vendor:oraclemodel:solarisscope:eqversion:10

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3 (x86)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3 (x86-64)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:3.0 (x86-64)

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:4.0

Trust: 0.8

vendor:cybertrustmodel:asianux serverscope:eqversion:4.0 (x86-64)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:3.0

Trust: 0.8

vendor:turbo linuxmodel:turbolinux appliance serverscope:eqversion:3.0 (x64)

Trust: 0.8

vendor:turbo linuxmodel:turbolinux clientscope:eqversion:2008

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:11

Trust: 0.8

vendor:turbo linuxmodel:turbolinux serverscope:eqversion:11 (x64)

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.11

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.23

Trust: 0.8

vendor:hewlett packardmodel:hp-uxscope:eqversion:11.31

Trust: 0.8

vendor:hewlett packardmodel:hp-ux apache-based web serverscope:eqversion:v.2.2.15.03

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4 (ws)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4.8 (as)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:4.8 (es)

Trust: 0.8

vendor:red hatmodel:enterprise linuxscope:eqversion:5 (server)

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:4.0

Trust: 0.8

vendor:red hatmodel:enterprise linux desktopscope:eqversion:5.0 (client)

Trust: 0.8

vendor:red hatmodel:enterprise linux eusscope:eqversion:5.4.z (server)

Trust: 0.8

vendor:red hatmodel:rhel desktop workstationscope:eqversion:5 (client)

Trust: 0.8

vendor:fujitsumodel:interstage application serverscope: - version: -

Trust: 0.8

vendor:fujitsumodel:interstage studioscope: - version: -

Trust: 0.8

vendor:fujitsumodel:interstage web serverscope: - version: -

Trust: 0.8

vendor:ibmmodel:http serverscope:eqversion:6.1.0

Trust: 0.6

vendor:sunmodel:opensolaris build snv 41scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 104scope: - version: -

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.10

Trust: 0.6

vendor:sunmodel:opensolaris build snv 83scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 106scope: - version: -

Trust: 0.6

vendor:redhatmodel:certificate serverscope:eqversion:7.3

Trust: 0.6

vendor:sunmodel:opensolaris build snv 56scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 95scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 38scope: - version: -

Trust: 0.6

vendor:kolabmodel:groupware server 2.2-rc3scope: - version: -

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.22

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.18

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.11

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.15

Trust: 0.6

vendor:sunmodel:opensolaris build snv 54scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 93scope: - version: -

Trust: 0.6

vendor:avayamodel:voice portalscope:eqversion:5.1

Trust: 0.6

vendor:rpathmodel:linuxscope:eqversion:1

Trust: 0.6

vendor:sunmodel:opensolaris build snv 35scope: - version: -

Trust: 0.6

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.1

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.29

Trust: 0.6

vendor:bluemodel:coat systems directorscope:eqversion:5.2.2.5

Trust: 0.6

vendor:sunmodel:opensolaris build snv 92scope: - version: -

Trust: 0.6

vendor:avayamodel:voice portal sp1scope:eqversion:4.1

Trust: 0.6

vendor:avayamodel:intuity audix lx sp2scope:eqversion:2.0

Trust: 0.6

vendor:sunmodel:opensolaris build snv 76scope: - version: -

Trust: 0.6

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.1

Trust: 0.6

vendor:kolabmodel:groupware server -rc2scope:eqversion:2.2

Trust: 0.6

vendor:kolabmodel:groupware serverscope:eqversion:2.2.3

Trust: 0.6

vendor:avayamodel:voice portal sp2scope:eqversion:4.1

Trust: 0.6

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.0

Trust: 0.6

vendor:sunmodel:opensolaris build snv 84scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 101ascope: - version: -

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.21

Trust: 0.6

vendor:sunmodel:opensolaris build snv 105scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 99scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 111ascope: - version: -

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1

Trust: 0.6

vendor:bluemodel:coat systems directorscope:eqversion:0

Trust: 0.6

vendor:avayamodel:intuity audix lx sp1scope:eqversion:2.0

Trust: 0.6

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.2

Trust: 0.6

vendor:sunmodel:opensolaris build snv 87scope: - version: -

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.1

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.6

Trust: 0.6

vendor:sunmodel:opensolaris build snv 88scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 98scope: - version: -

Trust: 0.6

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.2.2

Trust: 0.6

vendor:sunmodel:opensolaris build snv 58scope: - version: -

Trust: 0.6

vendor:bluemodel:coat systems directorscope:neversion:5.5.2.3

Trust: 0.6

vendor:sunmodel:opensolaris build snv 111scope: - version: -

Trust: 0.6

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.2

Trust: 0.6

vendor:sunmodel:opensolaris build snv 100scope: - version: -

Trust: 0.6

vendor:bluemodel:coat systems directorscope:eqversion:5.5

Trust: 0.6

vendor:avayamodel:voice portalscope:eqversion:4.0

Trust: 0.6

vendor:sunmodel:opensolaris build snv 59scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 49scope: - version: -

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.25

Trust: 0.6

vendor:avayamodel:aura sip enablement servicesscope:eqversion:4.0

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.9

Trust: 0.6

vendor:sunmodel:opensolaris build snv 57scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 22scope: - version: -

Trust: 0.6

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.0.1

Trust: 0.6

vendor:kolabmodel:groupware serverscope:neversion:2.2.4

Trust: 0.6

vendor:sunmodel:opensolaris build snv 81scope: - version: -

Trust: 0.6

vendor:kolabmodel:groupware serverscope:eqversion:2.2

Trust: 0.6

vendor:sunmodel:opensolaris build snv 103scope: - version: -

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.13

Trust: 0.6

vendor:sunmodel:opensolaris build snv 85scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 19scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 107scope: - version: -

Trust: 0.6

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.1

Trust: 0.6

vendor:sunmodel:opensolaris build snv 45scope: - version: -

Trust: 0.6

vendor:avayamodel:meeting exchangescope:eqversion:5.0

Trust: 0.6

vendor:sunmodel:solaris 10 sparcscope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 96scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 110scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 71scope: - version: -

Trust: 0.6

vendor:avayamodel:message networkingscope:eqversion:3.1

Trust: 0.6

vendor:kolabmodel:groupware serverscope:eqversion:2.2.2

Trust: 0.6

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.6

vendor:avayamodel:meeting exchange sp2scope:eqversion:5.0

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.2

Trust: 0.6

vendor:rpathmodel:appliance platform linux servicescope:eqversion:1

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.8

Trust: 0.6

vendor:sunmodel:opensolaris build snv 78scope: - version: -

Trust: 0.6

vendor:avayamodel:aura sip enablement servicesscope:eqversion:3.1

Trust: 0.6

vendor:sunmodel:opensolaris build snv 108scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 28scope: - version: -

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.14

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.19

Trust: 0.6

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.2

Trust: 0.6

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.0

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.17

Trust: 0.6

vendor:sunmodel:opensolaris build snv 91scope: - version: -

Trust: 0.6

vendor:bluemodel:coat systems directorscope:eqversion:5.4

Trust: 0.6

vendor:sunmodel:opensolaris build snv 36scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 89scope: - version: -

Trust: 0.6

vendor:avayamodel:voice portalscope:eqversion:4.1

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.12

Trust: 0.6

vendor:sunmodel:opensolaris build snv 47scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 39scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 48scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 64scope: - version: -

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.7

Trust: 0.6

vendor:kolabmodel:groupware server 2.2-rc1scope: - version: -

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.0.27

Trust: 0.6

vendor:bluemodel:coat systems directorscope:eqversion:4.2.2.4

Trust: 0.6

vendor:avayamodel:message networkingscope:eqversion:5.2

Trust: 0.6

vendor:sunmodel:opensolaris build snv 94scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 37scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 101scope: - version: -

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.3

Trust: 0.6

vendor:sunmodel:opensolaris build snv 90scope: - version: -

Trust: 0.6

vendor:kolabmodel:groupware server beta3scope:eqversion:2.2

Trust: 0.6

vendor:sunmodel:opensolaris build snv 68scope: - version: -

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.5

Trust: 0.6

vendor:sunmodel:opensolaris build snv 109scope: - version: -

Trust: 0.6

vendor:sunmodel:solaris 10 x86scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 74scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 67scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 51scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 50scope: - version: -

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.20

Trust: 0.6

vendor:avayamodel:intuity audix lxscope:eqversion:2.0

Trust: 0.6

vendor:sunmodel:opensolaris build snv 102scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 02scope: - version: -

Trust: 0.6

vendor:kolabmodel:groupware server beta1scope:eqversion:2.2

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.23

Trust: 0.6

vendor:sunmodel:opensolaris build snv 77scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 61scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 111bscope: - version: -

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:eqversion:6.1.4

Trust: 0.6

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.2.1

Trust: 0.6

vendor:sunmodel:opensolaris build snv 80scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 82scope: - version: -

Trust: 0.6

vendor:ibmmodel:websphere application serverscope:neversion:6.1.0.31

Trust: 0.6

vendor:sunmodel:opensolaris build snv 01scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 86scope: - version: -

Trust: 0.6

vendor:sunmodel:opensolaris build snv 29scope: - version: -

Trust: 0.6

vendor:avayamodel:meeting exchange sp1scope:eqversion:5.0

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:2.2.0

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:2.2.5

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:2.2.9

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:2.2.6

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:2.2.2

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:2.2.1

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:2.2.3

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:2.2

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:2.2.8

Trust: 0.6

vendor:apachemodel:http serverscope:eqversion:2.2.4

Trust: 0.6

vendor:debianmodel:linux armelscope:eqversion:5.0

Trust: 0.3

vendor:apachemodel:2.2.5-devscope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:8.10

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.3

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:5.0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

vendor:debianmodel:linux hppascope:eqversion:5.0

Trust: 0.3

vendor:applemodel:mac osscope:neversion:x10.6.5

Trust: 0.3

vendor:redhatmodel:jboss enterprise web server for rhel esscope:eqversion:41.0

Trust: 0.3

vendor:susemodel:linux enterprise sp3scope:eqversion:10

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.17

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.13

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.35

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.10

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.6

Trust: 0.3

vendor:mandrakesoftmodel:corporate server x86 64scope:eqversion:4.0

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.5

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:6.06

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.0

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop versionscope:eqversion:4

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:8.04

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.1

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.12

Trust: 0.3

vendor:ibmmodel:http serverscope:neversion:7.0.11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.4

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:8.04

Trust: 0.3

vendor:apachemodel:2.2.6-devscope: - version: -

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.0.1

Trust: 0.3

vendor:ibmmodel:http serverscope:neversion:6.0.2.41

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:8.10

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:5.0

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:6.06

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.3

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2008.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:susemodel:linux enterprise sp2scope:eqversion:10

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.2

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2010.0

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:6.06

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:8.04

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.0

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.19

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.1

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:7.0.0.5

Trust: 0.3

vendor:vmwaremodel:ace management server for linuxscope:eqversion:0

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.1

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:9.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.3

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:5.1

Trust: 0.3

vendor:rpathmodel:appliance platform linux servicescope:eqversion:2

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.1

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.15

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.0

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.13

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:6.06

Trust: 0.3

vendor:redhatmodel:jboss enterprise web server for rhel serverscope:eqversion:51.0

Trust: 0.3

vendor:mandrakesoftmodel:corporate serverscope:eqversion:4.0

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.27

Trust: 0.3

vendor:susemodel:linux enterprisescope:eqversion:11

Trust: 0.3

vendor:apachemodel:2.2.7-devscope: - version: -

Trust: 0.3

vendor:applemodel:mac os serverscope:neversion:x10.6.5

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:9.10

Trust: 0.3

vendor:redhatmodel:jboss enterprise web server for rhel asscope:eqversion:41.0

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:3.1.1

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:9.10

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.2

Trust: 0.3

vendor:debianmodel:linux alphascope:eqversion:5.0

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:9.10

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:ubuntumodel:linux lts lpiascope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:9.10

Trust: 0.3

vendor:redhatmodel:enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:9.04

Trust: 0.3

vendor:apachemodel:2.2.15-devscope:neversion: -

Trust: 0.3

vendor:apachemodel:apachescope:neversion:2.2.15

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:4.0

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.14

Trust: 0.3

vendor:redhatmodel:enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:hpmodel:hp-ux b.11.11scope: - version: -

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:aura sip enablement servicesscope:eqversion:5.2.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.4

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:9.04

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:4.2.3

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:4.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2

Trust: 0.3

vendor:redhatmodel:enterprise linux wsscope:eqversion:4

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.19

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.4

Trust: 0.3

vendor:ibmmodel:http serverscope:neversion:6.1.31

Trust: 0.3

vendor:ubuntumodel:linux lpiascope:eqversion:8.10

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:messaging storage server sp1scope:eqversion:5.2

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.33

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.25

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.11

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:9.04

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2008.0

Trust: 0.3

vendor:s u s emodel:opensusescope:eqversion:11.2

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:9.04

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:5.0

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2010.0

Trust: 0.3

vendor:debianmodel:linux mipselscope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.12

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:5.0

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:avayamodel:aura communication managerscope:eqversion:5.2

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.8

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2009.1

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:8.10

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:9.04

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2009.0

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.1.0.13

Trust: 0.3

vendor:debianmodel:linux m68kscope:eqversion:5.0

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.27

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:6.0.2.23

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:5.0

Trust: 0.3

vendor:apachemodel:apachescope:eqversion:2.2.9

Trust: 0.3

vendor:rpathmodel:linuxscope:eqversion:2

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:5.0

Trust: 0.3

vendor:apachemodel:software foundation apache 2.0.62-devscope: - version: -

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.1

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2

Trust: 0.3

vendor:slackwaremodel:linux x86 64scope:eqversion:13.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.58

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.03

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.54

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.42

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.11

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.38

Trust: 0.3

vendor:avayamodel:aura application enablement servicesscope:eqversion:5.2

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.52

Trust: 0.3

vendor:redmodel:hat jboss enterprise web server for rhel asscope:eqversion:41.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.63

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j editionscope:eqversion:9.2

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.41

Trust: 0.3

vendor:slackwaremodel:linux x86 64 -currentscope: - version: -

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.2

Trust: 0.3

vendor:apachemodel:software foundation apache 2.2.5-devscope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j editionscope:eqversion:9.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.8

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.57

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.9

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise editionscope:eqversion:9.2

Trust: 0.3

vendor:avayamodel:meeting exchangescope:eqversion:5.2

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise editionscope:eqversion:9.0

Trust: 0.3

vendor:redmodel:hat jboss enterprise web server for rhel esscope:eqversion:41.0

Trust: 0.3

vendor:avayamodel:communication manager sp3scope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:communication managerscope:eqversion:4.0

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.13

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.9

Trust: 0.3

vendor:apachemodel:software foundation apachescope:neversion:2.2.15

Trust: 0.3

vendor:apachemodel:software foundation apache 2.2.15-devscope:neversion: -

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.59

Trust: 0.3

vendor:apachemodel:software foundation apache 2.0.60-devscope: - version: -

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.49

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.5

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j edition bscope:eqversion:9.0

Trust: 0.3

vendor:avayamodel:communication manager sp1scope:eqversion:4.0.3

Trust: 0.3

vendor:apachemodel:software foundation apache 2.0.61-devscope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.8

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:1.1

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.50

Trust: 0.3

vendor:avayamodel:communication managerscope:eqversion:5.2

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.10

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.6

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.5

Trust: 0.3

vendor:avayamodel:communication managerscope:eqversion:5.1.2

Trust: 0.3

vendor:apachemodel:software foundation apache -devscope:eqversion:2.0.56

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.1

Trust: 0.3

vendor:slackwaremodel:linux -currentscope: - version: -

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.51

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.12

Trust: 0.3

vendor:apachemodel:software foundation apache 2.0.64-devscope:neversion: -

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:12.1

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j edition 9.1.0bscope: - version: -

Trust: 0.3

vendor:slackwaremodel:linuxscope:eqversion:13.0

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.7

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.53

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:eqversion:7.0.0.1

Trust: 0.3

vendor:redmodel:hat jboss enterprise web server for rhel serverscope:eqversion:51.0

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.1

Trust: 0.3

vendor:apachemodel:software foundation apache 2.2.6-devscope: - version: -

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.55

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:2.0.47.1

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.37

Trust: 0.3

vendor:ibmmodel:http serverscope:eqversion:2.0.47

Trust: 0.3

vendor:avayamodel:voice portalscope:eqversion:5.0

Trust: 0.3

vendor:avayamodel:aura session managerscope:eqversion:5.2

Trust: 0.3

vendor:sunmodel:opensolaris build snv 13scope: - version: -

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.39

Trust: 0.3

vendor:avayamodel:communication managerscope:eqversion:5.0

Trust: 0.3

vendor:sunmodel:opensolarisscope:eqversion:0

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise edition bscope:eqversion:9.1.0

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise editionscope:eqversion:9.2

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.3

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.48

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.45

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j editionscope:eqversion:9.1

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise edition ascope:eqversion:9.0

Trust: 0.3

vendor:apachemodel:software foundation apache 2.2.7-devscope: - version: -

Trust: 0.3

vendor:ibmmodel:websphere application serverscope:neversion:7.0.11

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.43

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.47

Trust: 0.3

vendor:fujitsumodel:interstage application server enterprise edition 9.1.0bscope: - version: -

Trust: 0.3

vendor:fujitsumodel:interstage studio enterprise editionscope:eqversion:9.1

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j editionscope:eqversion:9.2

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.46

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.2

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.44

Trust: 0.3

vendor:fujitsumodel:interstage application server standard-j edition ascope:eqversion:9.0

Trust: 0.3

vendor:avayamodel:communication managerscope:eqversion:5.1

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.0.40

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.1

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.14

Trust: 0.3

vendor:apachemodel:software foundation apachescope:eqversion:2.2.4

Trust: 0.3

vendor:fujitsumodel:interstage studio standard-j edition bscope:eqversion:9.1.0

Trust: 0.3

sources: CERT/CC: VU#280613 // BID: 38580 // BID: 38494 // JVNDB: JVNDB-2010-001174 // JVNDB: JVNDB-2011-001633 // CNNVD: CNNVD-201003-073 // NVD: CVE-2010-0434

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-0434
value: MEDIUM

Trust: 1.0

NVD: CVE-2010-0434
value: MEDIUM

Trust: 0.8

IPA: JVNDB-2011-001633
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201003-073
value: MEDIUM

Trust: 0.6

VULMON: CVE-2010-0434
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2010-0434
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

IPA: JVNDB-2011-001633
severity: MEDIUM
baseScore: 5.1
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

sources: VULMON: CVE-2010-0434 // JVNDB: JVNDB-2010-001174 // JVNDB: JVNDB-2011-001633 // CNNVD: CNNVD-201003-073 // NVD: CVE-2010-0434

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.8

sources: JVNDB: JVNDB-2010-001174 // NVD: CVE-2010-0434

THREAT TYPE

remote

Trust: 0.8

sources: PACKETSTORM: 87107 // PACKETSTORM: 88619 // CNNVD: CNNVD-201003-073

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201003-073

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-001174

PATCH

title:HS11-007url:http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-007/index.html

Trust: 1.6

title:Fixed in Apache httpd 2.0.64url:http://httpd.apache.org/security/vulnerabilities_20.html#2.0.64

Trust: 0.8

title:Fixed in Apache httpd 2.2.15url:http://httpd.apache.org/security/vulnerabilities_22.html#2.2.15

Trust: 0.8

title:917867url:http://svn.apache.org/viewvc?view=revision&revision=917867

Trust: 0.8

title:HT4435url:http://support.apple.com/kb/HT4435

Trust: 0.8

title:HT4435url:http://support.apple.com/kb/HT4435?viewlocale=ja_JP

Trust: 0.8

title:httpd-2.2.3-31.4.0.1.AXS3url:https://tsn.miraclelinux.com/tsn_local/index.php?m=errata&a=detail&eid=1017

Trust: 0.8

title:HPUXWSATW313url:https://h20392.www2.hp.com/portal/swdepot/displayProductInfo.do?productNumber=HPUXWSATW313

Trust: 0.8

title:HPSBUX02531url:http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c02160663

Trust: 0.8

title:PM10658url:http://www-01.ibm.com/support/docview.wss?uid=swg1PM10658

Trust: 0.8

title:PM08939url:http://www-01.ibm.com/support/docview.wss?uid=swg1PM08939

Trust: 0.8

title:7014463url:http://www-01.ibm.com/support/docview.wss?uid=swg27014463#70011

Trust: 0.8

title:7014506url:http://www-01.ibm.com/support/docview.wss?uid=swg27014506#70011

Trust: 0.8

title:4026207url:http://www-01.ibm.com/support/docview.wss?uid=swg24026207

Trust: 0.8

title:2216url:https://www.miraclelinux.com/support/index.php?q=node/99&errata_id=2216

Trust: 0.8

title:2044url:http://www.miraclelinux.com/support/index.php?q=node/99&errata_id=2044

Trust: 0.8

title:Oracle Critical Patch Update Advisory - July 2013url:http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html

Trust: 0.8

title:Text Form of Oracle Critical Patch Update - July 2013 Risk Matricesurl:http://www.oracle.com/technetwork/topics/security/cpujuly2013verbose-1899830.html

Trust: 0.8

title:RHSA-2010:0168url:https://rhn.redhat.com/errata/RHSA-2010-0168.html

Trust: 0.8

title:RHSA-2010:0175url:https://rhn.redhat.com/errata/RHSA-2010-0175.html

Trust: 0.8

title:multiple_vulnerabilities_in_the_apacheurl:http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_the_apache

Trust: 0.8

title:July 2013 Critical Patch Update Released url:https://blogs.oracle.com/security/entry/july_2013_critical_patch_update

Trust: 0.8

title:TLSA-2010-9url:http://www.turbolinux.co.jp/security/2010/TLSA-2010-9j.txt

Trust: 0.8

title:HS11-007url:http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/HS11-007/index.html

Trust: 0.8

title:interstage_as_201002url:http://software.fujitsu.com/jp/security/products-fujitsu/solution/interstage_as_201002.html

Trust: 0.8

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3981

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3985

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3989

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windowsurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3993

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windowsurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3997

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windowsurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=4001

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for ibm iurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3969

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3973

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3977

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3984

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3988

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windowsurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3992

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windowsurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3996

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windowsurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=4000

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for ibm iurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3968

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3972

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3976

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3980

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3983

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3987

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3991

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windowsurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3995

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windowsurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3999

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for ibm iurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3967

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3971

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3975

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3979

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3982

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3986

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for HP-UXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3990

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windowsurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3994

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windowsurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3998

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for Windowsurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=4002

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for ibm iurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3966

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3970

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3974

Trust: 0.6

title:7.0.0.11: WebSphere Application Server V7.0 Fix Pack 11 for AIXurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=3978

Trust: 0.6

title:httpd-2.2.15.tarurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=235

Trust: 0.6

title:httpd-2.2.15.tarurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=234

Trust: 0.6

title:httpd-2.2.15-win32-srcurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=233

Trust: 0.6

title:httpd-2.2.15-win32-src-r2url:http://123.124.177.30/web/xxk/bdxqById.tag?id=232

Trust: 0.6

title:Red Hat: Low: httpd security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20100175 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: httpd security and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20100168 - Security Advisory

Trust: 0.1

title:Debian Security Advisories: DSA-2035-1 apache2 -- multiple issuesurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=3811ba0094d0547e7396cfccd4bfa0e7

Trust: 0.1

title:Ubuntu Security Notice: apache2 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-908-1

Trust: 0.1

title:Debian CVElist Bug Report Logs: "slowloris" denial-of-service vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=5ed45f95901af77f1f752912d098b48e

Trust: 0.1

title:Symantec Security Advisories: SA61 : Director multiple Apache vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories&qid=508649a9a651b4fb32a5cc0f1310d652

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2010-0434

Trust: 0.1

title:Pentest-Cheetsheeturl:https://github.com/MrFrozenPepe/Pentest-Cheetsheet

Trust: 0.1

title:ReconScanurl:https://github.com/GiJ03/ReconScan

Trust: 0.1

title:ReconScanurl:https://github.com/RoliSoft/ReconScan

Trust: 0.1

title:testurl:https://github.com/issdp/test

Trust: 0.1

title:ReconScanurl:https://github.com/kira1111/ReconScan

Trust: 0.1

title: - url:https://github.com/SecureAxom/strike

Trust: 0.1

title: - url:https://github.com/DButter/whitehat_public

Trust: 0.1

sources: VULMON: CVE-2010-0434 // JVNDB: JVNDB-2010-001174 // JVNDB: JVNDB-2011-001633 // CNNVD: CNNVD-201003-073

EXTERNAL IDS

db:NVDid:CVE-2010-0434

Trust: 4.3

db:BIDid:38494

Trust: 2.8

db:SECUNIAid:39115

Trust: 2.5

db:SECUNIAid:40096

Trust: 2.5

db:SECUNIAid:39100

Trust: 2.5

db:SECUNIAid:39628

Trust: 2.5

db:SECUNIAid:38776

Trust: 1.7

db:SECUNIAid:39656

Trust: 1.7

db:SECUNIAid:39501

Trust: 1.7

db:SECUNIAid:39632

Trust: 1.7

db:VUPENid:ADV-2010-1057

Trust: 1.7

db:VUPENid:ADV-2010-0994

Trust: 1.7

db:VUPENid:ADV-2010-1001

Trust: 1.7

db:VUPENid:ADV-2010-1411

Trust: 1.7

db:VUPENid:ADV-2010-0911

Trust: 1.7

db:BIDid:38580

Trust: 1.2

db:CERT/CCid:VU#280613

Trust: 1.1

db:XFid:56625

Trust: 0.8

db:JVNDBid:JVNDB-2010-001174

Trust: 0.8

db:JVNDBid:JVNDB-2011-001633

Trust: 0.8

db:CNNVDid:CNNVD-201003-073

Trust: 0.6

db:VULMONid:CVE-2010-0434

Trust: 0.1

db:PACKETSTORMid:114141

Trust: 0.1

db:PACKETSTORMid:86860

Trust: 0.1

db:PACKETSTORMid:94244

Trust: 0.1

db:PACKETSTORMid:87107

Trust: 0.1

db:PACKETSTORMid:88619

Trust: 0.1

sources: CERT/CC: VU#280613 // VULMON: CVE-2010-0434 // BID: 38580 // BID: 38494 // PACKETSTORM: 114141 // PACKETSTORM: 86860 // PACKETSTORM: 94244 // PACKETSTORM: 87107 // PACKETSTORM: 88619 // JVNDB: JVNDB-2010-001174 // JVNDB: JVNDB-2011-001633 // CNNVD: CNNVD-201003-073 // NVD: CVE-2010-0434

REFERENCES

url:https://issues.apache.org/bugzilla/show_bug.cgi?id=48359

Trust: 2.9

url:http://httpd.apache.org/security/vulnerabilities_22.html

Trust: 2.6

url:http://www.securityfocus.com/bid/38494

Trust: 2.5

url:http://secunia.com/advisories/39628

Trust: 2.5

url:http://secunia.com/advisories/40096

Trust: 2.5

url:http://secunia.com/advisories/39100

Trust: 2.5

url:http://secunia.com/advisories/39115

Trust: 2.5

url:http://www-01.ibm.com/support/docview.wss?uid=swg1pm12247

Trust: 2.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg1pm08939

Trust: 2.3

url:http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html

Trust: 2.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg1pm15829

Trust: 2.0

url:http://secunia.com/advisories/38776/

Trust: 1.7

url:http://svn.apache.org/viewvc?view=revision&revision=918427

Trust: 1.7

url:https://bugzilla.redhat.com/show_bug.cgi?id=570171

Trust: 1.7

url:http://svn.apache.org/viewvc?view=revision&revision=917867

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2010-0168.html

Trust: 1.7

url:http://www.redhat.com/support/errata/rhsa-2010-0175.html

Trust: 1.7

url:http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00006.html

Trust: 1.7

url:http://secunia.com/advisories/39501

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2010-may/040652.html

Trust: 1.7

url:http://lists.fedoraproject.org/pipermail/package-announce/2010-april/039957.html

Trust: 1.7

url:http://www.vupen.com/english/advisories/2010/1057

Trust: 1.7

url:http://secunia.com/advisories/39632

Trust: 1.7

url:http://www.vupen.com/english/advisories/2010/0911

Trust: 1.7

url:http://www.vupen.com/english/advisories/2010/0994

Trust: 1.7

url:http://www.debian.org/security/2010/dsa-2035

Trust: 1.7

url:http://www.vupen.com/english/advisories/2010/1001

Trust: 1.7

url:http://secunia.com/advisories/39656

Trust: 1.7

url:http://www.vupen.com/english/advisories/2010/1411

Trust: 1.7

url:http://lists.vmware.com/pipermail/security-announce/2010/000105.html

Trust: 1.7

url:http://www.vmware.com/security/advisories/vmsa-2010-0014.html

Trust: 1.7

url:http://support.apple.com/kb/ht4435

Trust: 1.7

url:http://lists.apple.com/archives/security-announce/2010//nov/msg00000.html

Trust: 1.7

url:http://marc.info/?l=bugtraq&m=127557640302499&w=2

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/56625

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a8695

Trust: 1.7

url:https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10358

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0434

Trust: 1.7

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0434

Trust: 1.6

url:http://svn.apache.org/viewvc?view=revision&revision=917870

Trust: 1.2

url:http://httpd.apache.org/security/vulnerabilities_20.html

Trust: 1.1

url: http://www.senseofsecurity.com.au/advisories/sos-10-002

Trust: 1.1

url:http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/server/protocol.c?r1=917617&r2=917867&pathrev=917867&diff_format=h

Trust: 1.1

url:https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3ccvs.httpd.apache.org%3e

Trust: 1.1

url:http://svn.apache.org/viewvc?view=revision&revision=917875

Trust: 0.9

url:http://www.securityfocus.com/bid/38580

Trust: 0.9

url:http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_the_apache

Trust: 0.9

url:http://xforce.iss.net/xforce/xfdb/56625

Trust: 0.8

url:http://jvn.jp/cert/jvnvu331391

Trust: 0.8

url:http://httpd.apache.org/

Trust: 0.6

url:http://kolab.org/pipermail/kolab-announce/2010/000095.html

Trust: 0.6

url:http://support.avaya.com/css/p8/documents/100081009

Trust: 0.6

url:https://kb.bluecoat.com/index?page=content&id=sa61&actp=list

Trust: 0.6

url:httpd.apache.org%3e

Trust: 0.6

url:https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d%40%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3ccvs.

Trust: 0.6

url:httpd.apache.org/security/vulnerabilities_22.html

Trust: 0.6

url:https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3ccvs.

Trust: 0.6

url:httpd/branches/2.2.x/server/protocol.c?r1=917617&r2=917867&pathrev=917867&diff_format=h

Trust: 0.6

url:http://svn.apache.org/viewvc/

Trust: 0.6

url:https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/rad2acee3ab838b52c04a0698b1728a9a43467bf365bd481c993c535d@%3ccvs.

Trust: 0.6

url:https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3ccvs.

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2010-0434

Trust: 0.4

url:http://www-01.ibm.com/support/docview.wss?uid=nas2bf1cf911c7a90284862576ed003c73aa

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg1pm10658

Trust: 0.3

url:http://support.avaya.com/css/p8/documents/100081010

Trust: 0.3

url:http://www-01.ibm.com/support/docview.wss?uid=swg1pm09447

Trust: 0.3

url:http://www.fujitsu.com/global/support/software/security/products-f/interstage-201002e.html

Trust: 0.3

url:http://www.kb.cert.org/vuls/id/280613

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2010-0408

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/200.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2010:0175

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2010-0434

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://usn.ubuntu.com/908-1/

Trust: 0.1

url:https://www.debian.org/security/./dsa-2035

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2791

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0031

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3368

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0031

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3192

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0408

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3368

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1452

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4317

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1452

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0053

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0883

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3348

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4317

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0021

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3607

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0021

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3348

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3607

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201206-25.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3192

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0883

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-0434

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-0053

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2791

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://www.vmware.com/security/advisoiries

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0205

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0425

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1205

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-3277

Trust: 0.1

url:http://www.vmware.com/download/player/

Trust: 0.1

url:http://www.vmware.com/security

Trust: 0.1

url:http://downloads.vmware.com/d/info/desktop_downloads/vmware_ace/2_7

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3277

Trust: 0.1

url:http://kb.vmware.com/kb/1055

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1205

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-0205

Trust: 0.1

url:http://www.vmware.com/download/ws/

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0425

Trust: 0.1

url:http://downloads.vmware.com/support/ws71/doc/releasenotes_ws712.html

Trust: 0.1

url:http://www.vmware.com/support/policies/security_response.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-2249

Trust: 0.1

url:http://downloads.vmware.com/support/player31/doc/releasenotes_player312.html

Trust: 0.1

url:http://www.vmware.com/support/policies/eos.html

Trust: 0.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2249

Trust: 0.1

url:http://downloads.vmware.com/support/ace27/doc/releasenotes_ace272.html

Trust: 0.1

url:http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

Trust: 0.1

url:http://www.vmware.com/support/policies/eos_vi.html

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.6_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.6_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.12-1ubuntu2.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.10_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.12-1ubuntu2.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.6_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.10_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.15_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.15_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.6_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.6_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.6_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.15_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.6_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.15_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.6_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.6_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.6_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.6.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.9-7ubuntu3.6_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.15_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.0.55-4ubuntu2.10_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.6_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.15_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.10_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.15_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.6_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.12-1ubuntu2.2_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.15_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.12-1ubuntu2.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.10_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.10_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.6_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.15_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.6_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.15_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.6_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.2.8-1ubuntu0.15_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.12-1ubuntu2.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.12-1ubuntu2.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.6_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.6_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.15_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.6_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9-7ubuntu3.6_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.10_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.6_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.15_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.12-1ubuntu2.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.10_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.15_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.8-1ubuntu0.15_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.6_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.6_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.10_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.6_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.15_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.10_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-common_2.0.55-4ubuntu2.10_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.6_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.12-1ubuntu2.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.15_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.15_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.6_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.12-1ubuntu2.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.15_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.6_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.10_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.6_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.12-1ubuntu2.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.10_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.6_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.10_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.10_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.12-1ubuntu2.2.diff.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.12-1ubuntu2.2_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.10.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-src_2.2.8-1ubuntu0.15_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.12-1ubuntu2.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.12-1ubuntu2.2_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.6_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.10_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.11-2ubuntu2.6_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.6_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-bin_2.2.12-1ubuntu2.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.10_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.6_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11.orig.tar.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.12-1ubuntu2.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.6_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.12-1ubuntu2.2_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.15_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.6_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.10_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.6_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.12-1ubuntu2.2_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.12-1ubuntu2.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.12.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.6_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8.orig.tar.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.15.diff.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.6_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.6_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.6_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.6_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.9-7ubuntu3.6_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.10_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.6_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.6_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.15_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.6_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.10_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.6_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.6_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.6_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.10_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.6_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.6_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.12-1ubuntu2.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.12-1ubuntu2.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.8-1ubuntu0.15.dsc

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.6_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.15_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.12-1ubuntu2.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.6_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.12-1ubuntu2.2_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.12-1ubuntu2.2_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.10_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.12-1ubuntu2.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.10_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0_2.0.55-4ubuntu2.10_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.10_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.15_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.15_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.10_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.8-1ubuntu0.15_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.10_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.6_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.6_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9-7ubuntu3.6.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.6_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.12-1ubuntu2.2_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/libapr0-dev_2.0.55-4ubuntu2.10_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.6_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.15_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.6_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.6_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.6_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.15_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.6_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.12-1ubuntu2.2_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.6_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.2.11-2ubuntu2.6_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.12-1ubuntu2.2_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.6_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.10_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.15_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.10_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.12-1ubuntu2.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.6_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.6_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.11-2ubuntu2.6_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.15_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-threaded-dev_2.0.55-4ubuntu2.10_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.6_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.6_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.12-1ubuntu2.2_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-mpm-itk_2.2.12-1ubuntu2.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.10_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.6_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.15_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.6_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.9-7ubuntu3.6_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.12-1ubuntu2.2_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.6_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.8-1ubuntu0.15_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.10.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-perchild_2.0.55-4ubuntu2.10_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec_2.2.11-2ubuntu2.6_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.10_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.9-7ubuntu3.6.diff.gz

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.9-7ubuntu3.6_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.15_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.15_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-doc_2.2.12-1ubuntu2.2_all.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.0.55-4ubuntu2.10_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.10_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.6_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-worker_2.2.9-7ubuntu3.6_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.0.55-4ubuntu2.10_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.10_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-worker_2.0.55-4ubuntu2.10_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.0.55-4ubuntu2.10_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-utils_2.2.8-1ubuntu0.15_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.2.9-7ubuntu3.6_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-prefork_2.2.8-1ubuntu0.15_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.11-2ubuntu2.6_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-utils_2.2.11-2ubuntu2.6_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.6_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.6_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-bin_2.2.12-1ubuntu2.2_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-event_2.2.8-1ubuntu0.15_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-bin_2.2.12-1ubuntu2.2_i386.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec_2.2.9-7ubuntu3.6_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.9-7ubuntu3.6_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-threaded-dev_2.2.11-2ubuntu2.6_lpia.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-mpm-event_2.2.11-2ubuntu2.6_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-src_2.2.9-7ubuntu3.6_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.6_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.8-1ubuntu0.15_i386.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.6_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-suexec-custom_2.2.9-7ubuntu3.6_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.6_amd64.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.11-2ubuntu2.6.diff.gz

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/universe/a/apache2/apache2-src_2.2.11-2ubuntu2.6_all.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.6_sparc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2_2.2.12-1ubuntu2.2.dsc

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2.2-bin_2.2.12-1ubuntu2.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2-prefork-dev_2.2.9-7ubuntu3.6_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.11-2ubuntu2.6_lpia.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-prefork-dev_2.2.12-1ubuntu2.2_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.6_powerpc.deb

Trust: 0.1

url:http://security.ubuntu.com/ubuntu/pool/main/a/apache2/apache2-mpm-prefork_2.0.55-4ubuntu2.10_amd64.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/universe/a/apache2/apache2-suexec-custom_2.2.11-2ubuntu2.6_sparc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-bin_2.2.12-1ubuntu2.2_powerpc.deb

Trust: 0.1

url:http://ports.ubuntu.com/pool/main/a/apache2/apache2.2-common_2.2.8-1ubuntu0.15_lpia.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_alpha.deb

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny7.diff.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9.orig.tar.gz

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_mips.deb

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-src_2.2.9-10+lenny7_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny7.dsc

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b4_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_mips.deb

Trust: 0.1

url:http://security.debian.org/

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-doc_2.2.9-10+lenny7_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2.2-common_2.2.9-10+lenny7_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_armel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-prefork-dev_2.2.9-10+lenny7_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_ia64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_hppa.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-utils_2.2.9-10+lenny7_hppa.deb

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-dbg_2.2.9-10+lenny7_sparc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_i386.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-prefork_2.2.9-10+lenny7_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_alpha.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2_2.2.9-10+lenny7_all.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_arm.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-worker_2.2.9-10+lenny7_ia64.deb

Trust: 0.1

url:http://packages.debian.org/<pkg>

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-threaded-dev_2.2.9-10+lenny7_mipsel.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec-custom_2.2.9-10+lenny7_powerpc.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2-mpm-itk/apache2-mpm-itk_2.2.6-02-1+lenny2+b3_s390.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-suexec_2.2.9-10+lenny7_mips.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_amd64.deb

Trust: 0.1

url:http://security.debian.org/pool/updates/main/a/apache2/apache2-mpm-event_2.2.9-10+lenny7_alpha.deb

Trust: 0.1

sources: CERT/CC: VU#280613 // VULMON: CVE-2010-0434 // BID: 38580 // BID: 38494 // PACKETSTORM: 114141 // PACKETSTORM: 86860 // PACKETSTORM: 94244 // PACKETSTORM: 87107 // PACKETSTORM: 88619 // JVNDB: JVNDB-2010-001174 // JVNDB: JVNDB-2011-001633 // CNNVD: CNNVD-201003-073 // NVD: CVE-2010-0434

CREDITS

Brett Gervasoni

Trust: 0.9

sources: BID: 38494 // CNNVD: CNNVD-201003-073

SOURCES

db:CERT/CCid:VU#280613
db:VULMONid:CVE-2010-0434
db:BIDid:38580
db:BIDid:38494
db:PACKETSTORMid:114141
db:PACKETSTORMid:86860
db:PACKETSTORMid:94244
db:PACKETSTORMid:87107
db:PACKETSTORMid:88619
db:JVNDBid:JVNDB-2010-001174
db:JVNDBid:JVNDB-2011-001633
db:CNNVDid:CNNVD-201003-073
db:NVDid:CVE-2010-0434

LAST UPDATE DATE

2025-08-11T22:13:13.620000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#280613date:2010-03-11T00:00:00
db:VULMONid:CVE-2010-0434date:2023-02-13T00:00:00
db:BIDid:38580date:2015-04-13T21:39:00
db:BIDid:38494date:2015-04-13T21:26:00
db:JVNDBid:JVNDB-2010-001174date:2014-05-21T00:00:00
db:JVNDBid:JVNDB-2011-001633date:2014-05-21T00:00:00
db:CNNVDid:CNNVD-201003-073date:2023-02-14T00:00:00
db:NVDid:CVE-2010-0434date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CERT/CCid:VU#280613date:2010-03-11T00:00:00
db:VULMONid:CVE-2010-0434date:2010-03-05T00:00:00
db:BIDid:38580date:2010-03-02T00:00:00
db:BIDid:38494date:2010-03-02T00:00:00
db:PACKETSTORMid:114141date:2012-06-24T23:54:52
db:PACKETSTORMid:86860date:2010-03-03T13:02:16
db:PACKETSTORMid:94244date:2010-09-25T18:50:30
db:PACKETSTORMid:87107date:2010-03-11T02:26:31
db:PACKETSTORMid:88619date:2010-04-19T20:24:19
db:JVNDBid:JVNDB-2010-001174date:2010-03-23T00:00:00
db:JVNDBid:JVNDB-2011-001633date:2011-06-29T00:00:00
db:CNNVDid:CNNVD-201003-073date:2010-03-05T00:00:00
db:NVDid:CVE-2010-0434date:2010-03-05T19:30:00.577