Beschreibung: | Summary: The remote host is missing an update for the 'apache' package(s) announced via the SSA:2004-133-01 advisory.
Vulnerability Insight: New apache packages are available for Slackware 8.1, 9.0, 9.1, and -current to fix security issues. These include a possible denial-of-service attack as well as the ability to possible pipe shell escapes through Apache's errorlog (which could create an exploit if the error log is read in a terminal program that does not filter such escapes). We recommend that sites running Apache upgrade to the new Apache package.
More details about these issues may be found in the Common Vulnerabilities and Exposures (CVE) database:
[links moved to references]
Here are the details from the Slackware 9.1 ChangeLog: +--------------------------+ Wed May 12 13:06:39 PDT 2004 patches/packages/apache-1.3.29-i486-2.tgz: Patched four security issues in the Apache web server as noted on [link moved to references]. These security fixes were backported from Apache 1.3.31:
In mod_digest, verify whether the nonce returned in the client response is one we issued ourselves. This problem does not affect mod_auth_digest. (CAN-2003-0987)
Escape arbitrary data before writing into the errorlog. (CAN-2003-0020)
Fix starvation issue on listening sockets where a short-lived connection on a rarely-accessed listening socket will cause a child to hold the accept mutex and block out new connections until another connection arrives on that rarely-accessed listening socket. (CAN-2004-0174)
Fix parsing of Allow/Deny rules using IP addresses without a netmask, issue is only known to affect big-endian 64-bit platforms (CAN-2003-0993)
For more details, see: [links moved to references]
(* Security fix *) +--------------------------+
Affected Software/OS: 'apache' package(s) on Slackware 8.1, Slackware 9.0, Slackware 9.1, Slackware current.
Solution: Please install the updated package(s).
CVSS Score: 7.5
CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
|