Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.11507
Categoría:Misc.
Título:Apache < 2.0.45
Resumen:NOSUMMARY
Descripción:Description:

The remote host appears to be running a version of
Apache 2.x which is older than 2.0.45

This version is vulnerable to various flaws :

- There is a denial of service attack which may allow
an attacker to disable this server remotely

- The httpd process leaks file descriptors to child processes,
such as CGI scripts. An attacker who has the ability to execute
arbitrary CGI scripts on this server (including PHP code) would
be able to write arbitrary data in the file pointed to (in particular,
the log files)

Solution : Upgrade to version 2.0.45
See also : http://www.apache.org/dist/httpd/CHANGES_2.0
Risk factor : High

Referencia Cruzada: BugTraq ID: 7254
BugTraq ID: 7255
Common Vulnerability Exposure (CVE) ID: CVE-2003-0132
Bugtraq: 20030402 [ANNOUNCE] Apache 2.0.45 Released (Google Search)
http://marc.info/?l=bugtraq&m=104931360606484&w=2
Bugtraq: 20030408 Exploit Code Released for Apache 2.x Memory Leak (Google Search)
http://marc.info/?l=bugtraq&m=104994309010974&w=2
Bugtraq: 20030408 iDEFENSE Security Advisory 04.08.03: Denial of Service in Apache HTTP Server 2.x (Google Search)
http://marc.info/?l=bugtraq&m=104982175321731&w=2
Bugtraq: 20030409 GLSA: apache (200304-01) (Google Search)
http://marc.info/?l=bugtraq&m=104994239010517&w=2
Bugtraq: 20030410 working apache <= 2.0.44 DoS exploit for linux. (Google Search)
http://marc.info/?l=bugtraq&m=105001663120995&w=2
Bugtraq: 20030411 PATCH: [CAN-2003-0132] Apache 2.0.44 Denial of Service (Google Search)
http://marc.info/?l=bugtraq&m=105013378320711&w=2
CERT/CC vulnerability note: VU#206537
http://www.kb.cert.org/vuls/id/206537
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=205147
http://www.idefense.com/advisory/04.08.03.txt
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd00b45b93fda4a5bd013b28587207d0e00f99f6e3308dbb6025f3b01@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6@%3Ccvs.httpd.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A156
http://www.redhat.com/support/errata/RHSA-2003-139.html
http://secunia.com/advisories/34920
http://secunia.com/advisories/8499
http://www.vupen.com/english/advisories/2009/1233
CopyrightThis script is Copyright (C) 2003 Renaud Deraison

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.