Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.51502
Categoría:Conectiva Local Security Checks
Título:Conectiva Security Advisory CLA-2002:465
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory CLA-2002:465.

mod_ssl[1] is an Apache module which enables the use of encrypted
connections (https://) to the web server and other crypto-related
functions.

Ed Moyle announced[2] a buffer overflow
vulnerability[3] in the mod_ssl module. This module is not part of
the apache distribution, but is bundled and enabled by default in the
Conectiva Linux Apache packages.

A remote attacker could exploit this vulnerability and execute
arbitrary commands on the server running apache with this module
enabled. A probable way to explore this is via client certificate
authentication, where the attacker would use a specially crafted
certificate to overflow this buffer. Since this vulnerability happens
only after the client certificate has been checked, this means that
it would have to be signed by a CA accepted by the apache server.


Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://www.securityspace.com/smysecure/catid.html?in=CLA-2002:465
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002002

Risk factor : High

CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.