Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.55803
Kategorie:Slackware Local Security Checks
Titel:Slackware: Security Advisory (SSA:2005-310-04)
Zusammenfassung:The remote host is missing an update for the 'apache' package(s) announced via the SSA:2005-310-04 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'apache' package(s) announced via the SSA:2005-310-04 advisory.

Vulnerability Insight:
New apache packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1,
10.2, and -current to fix potential security issues:

* If a request contains both Transfer-Encoding and Content-Length
headers, remove the Content-Length, mitigating some HTTP Request
Splitting/Spoofing attacks.

* Added TraceEnable [onoffextended] per-server directive to alter
the behavior of the TRACE method.

It's hard to say how much real-world impact these have, as there's no more
information about that in the announcement. The original Apache announcement
can be read here:

[link moved to references]

Note that if you use mod_ssl, you will also need a new mod_ssl package. These
have been provided for the same releases of Slackware.

Here are the details from the Slackware 10.2 ChangeLog:
+--------------------------+
patches/packages/apache-1.3.34-i486-1.tgz: Upgraded to apache-1.3.34.
Fixes this minor security bug: 'If a request contains both Transfer-Encoding
and Content-Length headers, remove the Content-Length, mitigating some HTTP
Request Splitting/Spoofing attacks.'
(* Security fix *)
patches/packages/mod_ssl-2.8.25_1.3.34-i486-1.tgz:
Upgraded to mod_ssl-2.8.25-1.3.34.
+--------------------------+

Affected Software/OS:
'apache' package(s) on Slackware 8.1, Slackware 9.0, Slackware 9.1, Slackware 10.0, Slackware 10.1, Slackware 10.2, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

CopyrightCopyright (C) 2012 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.