Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Mandrake Local Security Checks --> Category: infos

MDKSA-2005:161: apache2 Vulnerability Scan


Vulnerability Scan Summary
Check for the version of the apache2 package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory MDKSA-2005:161 (apache2).



A flaw was discovered in mod_ssl's handling of the 'SSLVerifyClient' directive.
This flaw occurs if a virtual host is configured using 'SSLVerifyClient
optional' and a directive 'SSLVerifyClient required' is set for a specific
location. For servers configured in this fashion, a possible hacker may be able to
access resources that should otherwise be protected, by not supplying a client
certificate when connecting. (CVE-2005-2700)

A flaw was discovered in Apache httpd where the byterange filter would buffer
certain responses into memory. If a server has a dynamic resource such as a CGI
script or PHP script that generates a large amount of data, a possible hacker could
send carefully crafted requests in order to consume resources, potentially
leading to a Denial of Service. (CVE-2005-2728)

The updated packages have been patched to address these issues.



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:161
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.