|
Family: Red Hat Local Security Checks --> Category: infos
RHSA-2004-349: httpd Vulnerability Scan
Vulnerability Scan Summary Check for the version of the httpd packages
Detailed Explanation for this Vulnerability Test
Updated httpd packages that include a security fix for mod_ssl and various
enhancements are now available.
The Apache HTTP server is a powerful, full-featured, efficient, and
freely-available Web server.
An input filter bug in mod_ssl was discovered in Apache httpd version
2.0.50 and earlier. A remote attacker could force an SSL connection to be
aborted in a particular state and cause an Apache child process to enter an
infinite loop, consuming CPU resources. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-0748 to
this issue.
Additionally, this update includes the following enhancements and bug
fixes:
- included an improved version of the mod_cgi module that correctly handles
concurrent output on stderr and stdout
- included support for direct lookup of SSL variables using %{SSL:...}
from mod_rewrite, or using %{...}s from mod_headers
- restored support for use of SHA1-encoded passwords
- added the mod_ext_filter module
Users of the Apache HTTP server should upgrade to these updated packages,
which contain backported patches that address these issues.
Solution : http://rhn.redhat.com/errata/RHSA-2004-349.html
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.
|