SuSE Security Advisory SUSE-SA:2009:050 (apache2,libapr1)

Summary
The remote host is missing updates announced in advisory SUSE-SA:2009:050.
Solution
Update your system with the packages as indicated in the referenced security advisory. https://secure1.securityspace.com/smysecure/catid.html?in=SUSE-SA:2009:050
Insight
The Apache web server was updated to fix various security issues: - the option IncludesNOEXEC could be bypassed via .htaccess (CVE-2009-1195) - mod_proxy could run into an infinite loop when used as reverse proxy (CVE-2009-1890) - mod_deflate continued to compress large files even after a network connection was closed, causing mod_deflate to consume large amounts of CPU (CVE-2009-1891) - The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command. (CVE-2009-3094) - access restriction bypass in mod_proxy_ftp module (CVE-2009-3095) Also the libapr1 and libapr-util1 Apache helper libraries were updated to fix multiple integer overflows that could probably be used to execute arbitrary code remotely. (CVE-2009-2412)