Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.11507
Kategorie:Misc.
Titel:Apache < 2.0.45
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host appears to be running a version of
Apache 2.x which is older than 2.0.45

This version is vulnerable to various flaws :

- There is a denial of service attack which may allow
an attacker to disable this server remotely

- The httpd process leaks file descriptors to child processes,
such as CGI scripts. An attacker who has the ability to execute
arbitrary CGI scripts on this server (including PHP code) would
be able to write arbitrary data in the file pointed to (in particular,
the log files)

Solution : Upgrade to version 2.0.45
See also : http://www.apache.org/dist/httpd/CHANGES_2.0
Risk factor : High

Querverweis: BugTraq ID: 7254
BugTraq ID: 7255
Common Vulnerability Exposure (CVE) ID: CVE-2003-0132
Bugtraq: 20030402 [ANNOUNCE] Apache 2.0.45 Released (Google Search)
http://marc.info/?l=bugtraq&m=104931360606484&w=2
Bugtraq: 20030408 Exploit Code Released for Apache 2.x Memory Leak (Google Search)
http://marc.info/?l=bugtraq&m=104994309010974&w=2
Bugtraq: 20030408 iDEFENSE Security Advisory 04.08.03: Denial of Service in Apache HTTP Server 2.x (Google Search)
http://marc.info/?l=bugtraq&m=104982175321731&w=2
Bugtraq: 20030409 GLSA: apache (200304-01) (Google Search)
http://marc.info/?l=bugtraq&m=104994239010517&w=2
Bugtraq: 20030410 working apache <= 2.0.44 DoS exploit for linux. (Google Search)
http://marc.info/?l=bugtraq&m=105001663120995&w=2
Bugtraq: 20030411 PATCH: [CAN-2003-0132] Apache 2.0.44 Denial of Service (Google Search)
http://marc.info/?l=bugtraq&m=105013378320711&w=2
CERT/CC vulnerability note: VU#206537
http://www.kb.cert.org/vuls/id/206537
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=205147
http://www.idefense.com/advisory/04.08.03.txt
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6@%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A156
http://www.redhat.com/support/errata/RHSA-2003-139.html
http://secunia.com/advisories/34920
http://secunia.com/advisories/8499
http://www.vupen.com/english/advisories/2009/1233
CopyrightThis script is Copyright (C) 2003 Renaud Deraison

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.