'protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.'
This CVE is addressed in a backported fix to ClearOS. ClearOS 5.x systems running the latest updates are not vulnerable. ClearOS 6.x systems running the latest updates are not vulnerable.
Previous fixes to ClearOS addressed this issue. However, ClearOS does not increment version numbers in order to maintain dependencies between subsystems. The audit system has not taken into account ClearOS minor version numbers which correctly represent the fix to the system.
ClearOS has backported fixes to this problem. Updated versions of ClearOS 5.x are not vulnerable to this issue. Updated versions of ClearOS 6.x are not vulnerable to this issue.
To verify that you are running the a version of ClearOS that is not susceptible to this attack run your updates. Alternately, run the following to determine if they are already installed:
rpm -qi httpd
Pay attention to the Version and Release lines and compare to the following:
If your release number is the same or higher. This issue does NOT affect you.