The Apache mod_rewrite module fails to sanitize input, which may lead to arbitrary command execution in some circumstances.
The cPanel Security Team has rated this update has having critical security impact.
Information on security ratings is available at: http://go.cpanel.net/securitylevels. You are strongly encouraged to run EasyApache and update your Apache installation at your earliest convenience.
From CVE-2013-1862: “It was found that mod_rewrite did not filter terminal escape sequences from its log file. If mod_rewrite was configured with the RewriteLog directive, a remote attacker could use specially-crafted HTTP requests to inject terminal escape sequences into the mod_rewrite log file. If a victim viewed the log file with a terminal emulator, it could result in arbitrary command execution with the privileges of that user.”
All versions of Apache 2.2 and 2.4.
cPanel, Inc has released EasyApache 3.18.16 to correct this issue. To update, rebuild your EasyApache profile. For more information on rebuilding profiles, please consult our documentation (http://go.cpanel.net/ea)
EasyApache v3.18.16 addresses all known vulnerabilities.
Unless EasyApache updates are disabled on your system, the latest version of EasyApache will be used whenever EasyApache is run. Note that EasyApache updates must be done manually.
* CVE-2013-1862 (http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1862)
* CVSSv2: (AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C/CDP:MH/TD:H/CR:ND/IR:ND/AR:ND)
* RHSA-2013:0815 (http://rhn.redhat.com/errata/RHSA-2013-0815.html)
* Apache Patch: http://people.apache.org/~jorton/mod_rewrite-CVE-2013-1862.patch
For the PGP Signed message, please go here