Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.50523
Categoría:Mandrake Local Security Checks
Título:Mandrake Security Advisory MDKSA-2004:043 (apache2)
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing an update to apache2
announced via advisory MDKSA-2004:043.

A memory leak in mod_ssl in the Apache HTTP Server prior to version
2.0.49 allows a remote denial of service attack against an SSL-enabled
server.

The updated packages provide a patched mod_ssl to correct these
problems.

Affected versions: 10.0, 9.1, 9.2

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2004:043
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0113

Risk factor : Medium

CVSS Score:
5.0

Referencia Cruzada: BugTraq ID: 9826
Common Vulnerability Exposure (CVE) ID: CVE-2004-0113
http://marc.info/?l=bugtraq&m=108369640424244&w=2
http://www.securityfocus.com/bid/9826
Bugtraq: 20040325 LNSA-#2004-0006: bug workaround for Apache 2.0.48 (Google Search)
http://marc.info/?l=bugtraq&m=108034113406858&w=2
Conectiva Linux advisory: CLSA-2004:839
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000839
http://security.gentoo.org/glsa/glsa-200403-04.xml
HPdes Security Advisory: SSRT4717
http://marc.info/?l=bugtraq&m=108731648532365&w=2
http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:043
http://issues.apache.org/bugzilla/show_bug.cgi?id=27106
http://marc.info/?l=apache-cvs&m=107869699329638
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re028d61fe612b0908595d658b9b39e74bca56f2a1ed3c5f06b5ab571@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/raa117ef183f0da9b3f46efbeaa66f7622bd68868a450cae4fd8ed594@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r7035b7c9091c4b665a3b7205364775410646f12125d48e74e395f2ce@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6@%3Ccvs.httpd.apache.org%3E
http://www.osvdb.org/4182
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A876
http://www.redhat.com/support/errata/RHSA-2004-084.html
http://www.redhat.com/support/errata/RHSA-2004-182.html
http://www.trustix.org/errata/2004/0017
XForce ISS Database: apache-modssl-plain-dos(15419)
https://exchange.xforce.ibmcloud.com/vulnerabilities/15419
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.