Het ontwikkelteam achter Apache heeft versie 2.0.51 van zijn HTTP server-software uitgebracht. Deze release is voornamelijk een bugfix-versie. Het volledige changelog is hier te vinden, maar dit zijn de belangrijkste bugs die zijn verholpen:
This version of Apache is principally a bug fix release. Of particular note is that 2.0.51 addresses five security vulnerabilities:
- An input validation issue in IPv6 literal address parsing which can result in a negative length parameter being passed to memcpy. [CAN-2004-0786]
- A buffer overflow in configuration file parsing could allow a local user to gain the privileges of a httpd child if the server can be forced to parse a carefully crafted .htaccess file. [CAN-2004-0747]
- A segfault in mod_ssl which can be triggered by a malicious remote server, if proxying to SSL servers has been configured. [CAN-2004-0751]
- A potential infinite loop in mod_ssl which could be triggered given particular timing of a connection abort. [CAN-2004-0748]
- A segfault in mod_dav_fs which can be remotely triggered by an indirect lock refresh request. [CAN-2004-0809][break]De volgende downloads zijn beschikbaar:
Broncode voor Win32 compilers
Win32 installer
2.0.51 (tarball)
2.0.51 gzipped source