<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Recommended update for apache2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2015:0689-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2014-09-11T22:20:05Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2014-09-11T22:20:05Z</InitialReleaseDate>
    <CurrentReleaseDate>2014-09-11T22:20:05Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Recommended update for apache2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for the Apache Web Server introduces directives to control two 
protocol options:

    * HttpContentLengthHeadZero: Allow responses to HEAD request with
      Content-Length of 0
    * HttpExpectStrict: Allow the administrator to control whether clients
      must send '100-continue'

MODULE_MAGIC_NUMBER_MINOR has been increased to 24, as this change is not 
forward-compatible. Modules built against this release might not work 
correctly with older releases of the Apache Web Server.

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">sdksp3-apache2,slessp3-apache2</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150689-1/</URL>
      <Description>Link for SUSE-SU-2015:0689-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2015-April/001337.html</URL>
      <Description>E-Mail link for SUSE-SU-2015:0689-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/713970</URL>
      <Description>SUSE Bug 713970</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/791794</URL>
      <Description>SUSE Bug 791794</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/815621</URL>
      <Description>SUSE Bug 815621</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/829056</URL>
      <Description>SUSE Bug 829056</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/829057</URL>
      <Description>SUSE Bug 829057</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/844212</URL>
      <Description>SUSE Bug 844212</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/852401</URL>
      <Description>SUSE Bug 852401</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/859916</URL>
      <Description>SUSE Bug 859916</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/869105</URL>
      <Description>SUSE Bug 869105</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/869106</URL>
      <Description>SUSE Bug 869106</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/871310</URL>
      <Description>SUSE Bug 871310</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/887765</URL>
      <Description>SUSE Bug 887765</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/887768</URL>
      <Description>SUSE Bug 887768</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/894225</URL>
      <Description>SUSE Bug 894225</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/899836</URL>
      <Description>SUSE Bug 899836</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/904427</URL>
      <Description>SUSE Bug 904427</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/907339</URL>
      <Description>SUSE Bug 907339</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/907477</URL>
      <Description>SUSE Bug 907477</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2003-1418/</URL>
      <Description>SUSE CVE CVE-2003-1418 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1862/</URL>
      <Description>SUSE CVE CVE-2013-1862 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1896/</URL>
      <Description>SUSE CVE CVE-2013-1896 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-5704/</URL>
      <Description>SUSE CVE CVE-2013-5704 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-6438/</URL>
      <Description>SUSE CVE CVE-2013-6438 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0098/</URL>
      <Description>SUSE CVE CVE-2014-0098 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0226/</URL>
      <Description>SUSE CVE CVE-2014-0226 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-0231/</URL>
      <Description>SUSE CVE CVE-2014-0231 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-3581/</URL>
      <Description>SUSE CVE CVE-2014-3581 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3" CPE="cpe:/o:suse:suse_sles:11:sp3">SUSE Linux Enterprise Server 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3-TERADATA">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA" CPE="cpe:/o:suse:sles:11:sp3:teradata">SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3" CPE="cpe:/o:suse:sles_sap:11:sp3">SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP3" CPE="cpe:/a:suse:sle-sdk:11:sp3">SUSE Linux Enterprise Software Development Kit 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="apache2-2.2.12-1.50.1">
      <FullProductName ProductID="apache2-2.2.12-1.50.1">apache2-2.2.12-1.50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-devel-2.2.12-1.50.1">
      <FullProductName ProductID="apache2-devel-2.2.12-1.50.1">apache2-devel-2.2.12-1.50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-doc-2.2.12-1.50.1">
      <FullProductName ProductID="apache2-doc-2.2.12-1.50.1">apache2-doc-2.2.12-1.50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-example-pages-2.2.12-1.50.1">
      <FullProductName ProductID="apache2-example-pages-2.2.12-1.50.1">apache2-example-pages-2.2.12-1.50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-prefork-2.2.12-1.50.1">
      <FullProductName ProductID="apache2-prefork-2.2.12-1.50.1">apache2-prefork-2.2.12-1.50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-utils-2.2.12-1.50.1">
      <FullProductName ProductID="apache2-utils-2.2.12-1.50.1">apache2-utils-2.2.12-1.50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="apache2-worker-2.2.12-1.50.1">
      <FullProductName ProductID="apache2-worker-2.2.12-1.50.1">apache2-worker-2.2.12-1.50.1</FullProductName>
    </Branch>
    <Relationship ProductReference="apache2-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:apache2-2.2.12-1.50.1">apache2-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-doc-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:apache2-doc-2.2.12-1.50.1">apache2-doc-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-example-pages-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:apache2-example-pages-2.2.12-1.50.1">apache2-example-pages-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:apache2-prefork-2.2.12-1.50.1">apache2-prefork-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:apache2-utils-2.2.12-1.50.1">apache2-utils-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3:apache2-worker-2.2.12-1.50.1">apache2-worker-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Server 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.12-1.50.1">apache2-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-doc-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.12-1.50.1">apache2-doc-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-example-pages-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.12-1.50.1">apache2-example-pages-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.12-1.50.1">apache2-prefork-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.12-1.50.1">apache2-utils-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.12-1.50.1">apache2-worker-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-2.2.12-1.50.1">apache2-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-doc-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-doc-2.2.12-1.50.1">apache2-doc-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-example-pages-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-example-pages-2.2.12-1.50.1">apache2-example-pages-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-prefork-2.2.12-1.50.1">apache2-prefork-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-utils-2.2.12-1.50.1">apache2-utils-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-worker-2.2.12-1.50.1">apache2-worker-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-2.2.12-1.50.1">apache2-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-devel-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-devel-2.2.12-1.50.1">apache2-devel-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-doc-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-doc-2.2.12-1.50.1">apache2-doc-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-example-pages-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-example-pages-2.2.12-1.50.1">apache2-example-pages-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-prefork-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-prefork-2.2.12-1.50.1">apache2-prefork-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-utils-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-utils-2.2.12-1.50.1">apache2-utils-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="apache2-worker-2.2.12-1.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-worker-2.2.12-1.50.1">apache2-worker-2.2.12-1.50.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Apache HTTP Server 1.3.22 through 1.3.27 on OpenBSD allows remote attackers to obtain sensitive information via (1) the ETag header, which reveals the inode number, or (2) multipart MIME boundary, which reveals child process IDs (PID).</Note>
    </Notes>
    <CVE>CVE-2003-1418</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-devel-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150689-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2003-1418.html</URL>
        <Description>CVE-2003-1418</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/713970</URL>
        <Description>SUSE Bug 713970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/907477</URL>
        <Description>SUSE Bug 907477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917402</URL>
        <Description>SUSE Bug 917402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/970126</URL>
        <Description>SUSE Bug 970126</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator.</Note>
    </Notes>
    <CVE>CVE-2013-1862</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-devel-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150689-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1862.html</URL>
        <Description>CVE-2013-1862</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/829056</URL>
        <Description>SUSE Bug 829056</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/829057</URL>
        <Description>SUSE Bug 829057</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/834475</URL>
        <Description>SUSE Bug 834475</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/844212</URL>
        <Description>SUSE Bug 844212</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.</Note>
    </Notes>
    <CVE>CVE-2013-1896</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-devel-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150689-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1896.html</URL>
        <Description>CVE-2013-1896</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/829056</URL>
        <Description>SUSE Bug 829056</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/829057</URL>
        <Description>SUSE Bug 829057</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding.  NOTE: the vendor states "this is not a security issue in httpd as such."</Note>
    </Notes>
    <CVE>CVE-2013-5704</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-devel-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150689-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-5704.html</URL>
        <Description>CVE-2013-5704</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/871310</URL>
        <Description>SUSE Bug 871310</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/914535</URL>
        <Description>SUSE Bug 914535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930944</URL>
        <Description>SUSE Bug 930944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938728</URL>
        <Description>SUSE Bug 938728</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request.</Note>
    </Notes>
    <CVE>CVE-2013-6438</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-devel-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150689-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-6438.html</URL>
        <Description>CVE-2013-6438</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/869105</URL>
        <Description>SUSE Bug 869105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/869106</URL>
        <Description>SUSE Bug 869106</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/887765</URL>
        <Description>SUSE Bug 887765</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.</Note>
    </Notes>
    <CVE>CVE-2014-0098</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-devel-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150689-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0098.html</URL>
        <Description>CVE-2014-0098</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/869106</URL>
        <Description>SUSE Bug 869106</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/887765</URL>
        <Description>SUSE Bug 887765</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.</Note>
    </Notes>
    <CVE>CVE-2014-0226</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-devel-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150689-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0226.html</URL>
        <Description>CVE-2014-0226</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/887765</URL>
        <Description>SUSE Bug 887765</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.</Note>
    </Notes>
    <CVE>CVE-2014-0231</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-devel-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150689-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-0231.html</URL>
        <Description>CVE-2014-0231</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/887768</URL>
        <Description>SUSE Bug 887768</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The cache_merge_headers_out function in modules/cache/cache_util.c in the mod_cache module in the Apache HTTP Server before 2.4.11 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty HTTP Content-Type header.</Note>
    </Notes>
    <CVE>CVE-2014-3581</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-devel-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-doc-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-example-pages-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-prefork-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-utils-2.2.12-1.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP3:apache2-worker-2.2.12-1.50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20150689-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-3581.html</URL>
        <Description>CVE-2014-3581</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/899836</URL>
        <Description>SUSE Bug 899836</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
