Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Mandrake Local Security Checks --> Category: infos

MDKSA-2004:096: apache2 Vulnerability Scan

Vulnerability Scan Summary
Check for the version of the apache2 package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory MDKSA-2004:096 (apache2).

Two Denial of Service conditions were discovered in the input filter of mod_ssl,
the module that enables apache to handle HTTPS requests.
Another vulnerability was discovered by the ASF security team using the
Codenomicon HTTP Test Tool. This vulnerability, in the apr-util library, can
possibly lead to arbitray code execution if certain non-default conditions are
met (enabling the AP_ENABLE_EXCEPTION_HOOK define).
As well, the SITIC have discovered a buffer overflow when Apache expands
environment variables in configuration files such as .htaccess and httpd.conf,
which can lead to possible privilege escalation. This can only be done, however,
if a possible hacker is able to place malicious configuration files on the server.
Finally, a crash condition was discovered in the mod_dav module by Julian
Reschke, where sending a LOCK refresh request to an indirectly locked resource
could crash the server.
The updated packages have been patched to protect against these vulnerabilities.

Solution :
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.