Family: Mandrake Local Security Checks --> Category: infos
MDKSA-2004:096: apache2 Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the apache2 package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory MDKSA-2004:096 (apache2).
Two Denial of Service conditions were discovered in the input filter of mod_ssl,
the module that enables apache to handle HTTPS requests.
Another vulnerability was discovered by the ASF security team using the
Codenomicon HTTP Test Tool. This vulnerability, in the apr-util library, can
possibly lead to arbitray code execution if certain non-default conditions are
met (enabling the AP_ENABLE_EXCEPTION_HOOK define).
As well, the SITIC have discovered a buffer overflow when Apache expands
environment variables in configuration files such as .htaccess and httpd.conf,
which can lead to possible privilege escalation. This can only be done, however,
if a possible hacker is able to place malicious configuration files on the server.
Finally, a crash condition was discovered in the mod_dav module by Julian
Reschke, where sending a LOCK refresh request to an indirectly locked resource
could crash the server.
The updated packages have been patched to protect against these vulnerabilities.
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2004:096
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.