Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Mandrake Local Security Checks --> Category: infos

MDKSA-2004:065: apache Vulnerability Scan

Vulnerability Scan Summary
Check for the version of the apache package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory MDKSA-2004:065 (apache).

A buffer overflow vulnerability was found by George Guninski in Apache's
mod_proxy module, which can be exploited by a remote user to potentially execute
arbitrary code with the rights of an httpd child process (user apache). This
can only be exploited, however, if mod_proxy is actually in use.
It is recommended that you stop Apache prior to updating and then restart it
again once the update is complete ('service httpd stop' and 'service httpd
start' respectively).

Solution :
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.