Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.50723
Kategorie:Mandrake Local Security Checks
Titel:Mandrake Security Advisory MDKSA-2003:063 (apache2)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing an update to apache2
announced via advisory MDKSA-2003:063.

Two vulnerabilities were discovered in the Apache web server that
affect all 2.x versions prior to 2.0.46. The first, discovered by John
Hughes, is a build system problem that allows remote attackers to
prevent access to authenticated content when a threaded server is used.
This only affects versions of Apache compiled with threaded server
httpd.worker, which is not the default for Mandrake Linux.

The second vulnerability, discovered by iDefense, allows remote
attackers to cause a DoS (Denial of Service) condition and may also
allow the execution of arbitrary code.

The provided packages include back-ported fixes to correct these
vulnerabilities and MandrakeSoft encourages all users to upgrade
immediately.

Affected versions: 9.1

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2003:063
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0189
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0245

Risk factor : Medium

CVSS Score:
5.0

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2003-0189
BugTraq ID: 7725
http://www.securityfocus.com/bid/7725
Bugtraq: 20030528 [SECURITY] [ANNOUNCE] Apache 2.0.46 released (Google Search)
http://marc.info/?l=bugtraq&m=105418115512559&w=2
CERT/CC vulnerability note: VU#479268
http://www.kb.cert.org/vuls/id/479268
Conectiva Linux advisory: CLA-2003:661
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000661
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6@%3Ccvs.httpd.apache.org%3E
http://www.redhat.com/support/errata/RHSA-2003-186.html
http://secunia.com/advisories/8881
XForce ISS Database: apache-aprpasswordvalidate-dos(12091)
https://exchange.xforce.ibmcloud.com/vulnerabilities/12091
Common Vulnerability Exposure (CVE) ID: CVE-2003-0245
BugTraq ID: 7723
http://www.securityfocus.com/bid/7723
CERT/CC vulnerability note: VU#757612
http://www.kb.cert.org/vuls/id/757612
http://www.mandriva.com/security/advisories?name=MDKSA-2003:063
http://www.idefense.com/advisory/05.30.03.txt
http://archives.neohapsis.com/archives/vulnwatch/2003-q2/0095.html
XForce ISS Database: apache-aprpsprintf-code-execution(12090)
https://exchange.xforce.ibmcloud.com/vulnerabilities/12090
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.