Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.50757
Categoría:Mandrake Local Security Checks
Título:Mandrake Security Advisory MDKSA-2003:096-1 (apache2)
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing an update to apache2
announced via advisory MDKSA-2003:096-1.

A problem was discovered in Apache2 where CGI scripts that output more
than 4k of output to STDERR will hang the script's execution which can
cause a Denial of Service on the httpd process because it is waiting
for more input from the CGI that is not forthcoming due to the locked
write() call in mod_cgi.

On systems that use scripts that output more than 4k to STDERR, this
could cause httpd processes to hang and once the maximum connection
limit is reached, Apache will no longer respond to requests.

The updated packages provided use the latest mod_cgi.c from the Apache
2.1 CVS version.

Users may have to restart apache by hand after the upgrade by issuing
a service httpd restart.

Update:

The previous update introduced an experimental mod_cgi.c that while
fixing the deadlock did not do so in a correct manner and it likewise
introduced new problems with other scripts.

These packages roll back to the original mod_cgi.c until such a time as
the apache team have a proper fix in place. Both Mandrake Linux 9.1
and 9.2 are affected with this problem.

Likewise, a problem was discovered in the default mod_proxy
configuration which created an open proxy. Users who have installed
mod_perl also have mod_proxy installed due to dependencies and may
unknowingly have allowed spammers to use their MTA via the wide-open
mod_proxy settings.

MandrakeSoft encourages all users to upgrade to these new packages
immediately.

Affected versions: 9.1, 9.2

Solution:
To upgrade automatically use MandrakeUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

http://www.securityspace.com/smysecure/catid.html?in=MDKSA-2003:096-1
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=22030

Risk factor : High

CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.