![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.51165 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Security Advisory RHSA-2004:408 |
Resumen: | NOSUMMARY |
Descripción: | Description: The remote host is missing updates announced in advisory RHSA-2004:408. The mod_ssl module provides strong cryptography for the Apache Web server via the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols. A format string issue was discovered in mod_ssl for Apache 1.3 which can be triggered if mod_ssl is configured to allow a client to proxy to remote SSL sites. In order to exploit this issue, a user who is authorized to use Apache as a proxy would have to attempt to connect to a carefully crafted hostname via SSL. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0700 to this issue. Users of mod_ssl should upgrade to this updated package, which contains a backported patch to correct this issue. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date http://rhn.redhat.com/errata/RHSA-2004-408.html Risk factor : High CVSS Score: 7.5 |
Referencia Cruzada: |
BugTraq ID: 10736 Common Vulnerability Exposure (CVE) ID: CVE-2004-0700 http://www.securityfocus.com/bid/10736 Bugtraq: 20040716 [OpenPKG-SA-2004.032] OpenPKG Security Advisory (apache) (Google Search) http://marc.info/?l=bugtraq&m=109005001205991&w=2 CERT/CC vulnerability note: VU#303448 http://www.kb.cert.org/vuls/id/303448 Conectiva Linux advisory: CLA-2004:857 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000857 Debian Security Information: DSA-532 (Google Search) http://www.debian.org/security/2004/dsa-532 https://bugzilla.fedora.us/show_bug.cgi?id=1888 http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:075 http://packetstormsecurity.org/0407-advisories/modsslFormat.txt http://virulent.siyahsapka.org/ http://marc.info/?l=apache-modssl&m=109001100906749&w=2 http://www.osvdb.org/7929 http://www.redhat.com/support/errata/RHSA-2004-405.html http://www.redhat.com/support/errata/RHSA-2004-408.html http://www.ubuntu.com/usn/usn-177-1 XForce ISS Database: apache-modssl-format-string(16705) https://exchange.xforce.ibmcloud.com/vulnerabilities/16705 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |