Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Debian Local Security Checks --> Category: infos

[DSA525] DSA-525-1 apache Vulnerability Scan


Vulnerability Scan Summary
DSA-525-1 apache

Detailed Explanation for this Vulnerability Test

Georgi Guninski discovered a buffer overflow bug in Apache's mod_proxy
module, whereby a remote user could potentially cause arbitrary code
to be executed with the rights of an Apache httpd child process
(by default, user www-data). Note that this bug is only exploitable
if the mod_proxy module is in use.
Note that this bug exists in a module in the apache-common package,
shared by apache, apache-ssl and apache-perl, so this update is
sufficient to correct the bug for all three builds of Apache httpd.
However, on systems using apache-ssl or apache-perl, httpd will not
automatically be restarted.
For the current stable distribution (woody), this problem has been
fixed in version 1.3.26-0woody5.
For the unstable distribution (sid), this problem has been fixed in
version 1.3.31-2.
We recommend that you update your apache package.


Solution : http://www.debian.org/security/2004/dsa-525
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.