Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.51095
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2004:015
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory RHSA-2004:015.

The Apache HTTP Server is a powerful, full-featured, efficient, and
freely-available Web server.

An issue in the handling of regular expressions from configuration files
was discovered in releases of the Apache HTTP Server version 2.0 prior to
2.0.48. To exploit this issue an attacker would need to have the ability
to write to Apache configuration files such as .htaccess or httpd.conf. A
carefully-crafted configuration file can cause an exploitable buffer
overflow and would allow the attacker to execute arbitrary code in the
context of the server (in default configurations as the 'apache' user).
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2003-0542 to this issue.

Users of the Apache HTTP Server should upgrade to these erratum packages,
which contain backported patches correcting these issues, and are applied
to Apache version 2.0.46. This update also includes fixes for a number of
minor bugs found in this version of the Apache HTTP Server.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2004-015.html
http://www.apacheweek.com/features/security-20.html

Risk factor : High

CVSS Score:
7.2

Cross-Ref: BugTraq ID: 9504
BugTraq ID: 8911
Common Vulnerability Exposure (CVE) ID: CVE-2003-0542
http://lists.apple.com/archives/security-announce/2004/Jan/msg00000.html
http://www.securityfocus.com/bid/8911
http://www.securityfocus.com/bid/9504
Bugtraq: 20031028 [OpenPKG-SA-2003.046] OpenPKG Security Advisory (apache) (Google Search)
http://www.securityfocus.com/archive/1/342674
Bugtraq: 20031031 GLSA: apache (200310-04) (Google Search)
http://marc.info/?l=bugtraq&m=106761802305141&w=2
CERT/CC vulnerability note: VU#434566
http://www.kb.cert.org/vuls/id/434566
CERT/CC vulnerability note: VU#549142
http://www.kb.cert.org/vuls/id/549142
HPdes Security Advisory: HPSBOV02683
http://marc.info/?l=bugtraq&m=130497311408250&w=2
HPdes Security Advisory: HPSBUX0311-301
http://www.securityfocus.com/advisories/6079
HPdes Security Advisory: SSRT090208
Immunix Linux Advisory: IMNX-2003-7+-025-01
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:103
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6@%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3799
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A863
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A864
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9458
http://www.redhat.com/support/errata/RHSA-2003-320.html
http://www.redhat.com/support/errata/RHSA-2003-360.html
http://www.redhat.com/support/errata/RHSA-2003-405.html
http://www.redhat.com/support/errata/RHSA-2004-015.html
http://www.redhat.com/support/errata/RHSA-2005-816.html
SCO Security Bulletin: CSSA-2003-SCO.28
SCO Security Bulletin: SCOSA-2004.6
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2004.6/SCOSA-2004.6.txt
http://secunia.com/advisories/10096
http://secunia.com/advisories/10098
http://secunia.com/advisories/10102
http://secunia.com/advisories/10112
http://secunia.com/advisories/10114
http://secunia.com/advisories/10153
http://secunia.com/advisories/10260
http://secunia.com/advisories/10264
http://secunia.com/advisories/10463
http://secunia.com/advisories/10580
http://secunia.com/advisories/10593
SGI Security Advisory: 20031203-01-U
ftp://patches.sgi.com/support/free/security/advisories/20031203-01-U.asc
SGI Security Advisory: 20040202-01-U
ftp://patches.sgi.com/support/free/security/advisories/20040202-01-U.asc
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101444-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101841-1
XForce ISS Database: apache-modalias-modrewrite-bo(13400)
https://exchange.xforce.ibmcloud.com/vulnerabilities/13400
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.