Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.51587
Categoría:Conectiva Local Security Checks
Título:Conectiva Security Advisory CLA-2001:430
Resumen:NOSUMMARY
Descripción:Description:

The remote host is missing updates announced in
advisory CLA-2001:430.

Apache is a robust, commercial-grade web server.

Security problems have been found in the Apache packages shipped with
all versions of Conectiva Linux. This update fixes the following
vulnerabilities:

* A intentionally malformed Host: header could allow any file with
a .log extention to be overwritten due to a problem in the
split-logfile script. Conectiva Linux does not ship split-logfile,
but users who may have installed this script manually are thus
advised to check their systems for this vulnerability. [1]

* When Multiviews are used to negotiate the directory index, under
certain conditions a request for the URI /?M=D could return a
directory listing rather than negotiated content. [2] [3]

Additionally, this update solves a problem in mod_bandwidth shipped
with Conectiva Linux 7.0. [4]


REFERENCES

[1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0730
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-0731
[3] http://www.securityfocus.com/bid/3009
[4] http://bugzilla.conectiva.com.br/show_bug.cgi?id=4371


Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://www.securityspace.com/smysecure/catid.html?in=CLA-2001:430
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002001

Risk factor : Medium

CVSS Score:
5.0

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2001-0730
Conectiva Linux advisory: CLA-2001:430
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000430
En Garde Linux Advisory: ESA-20011019-01
http://www.linuxsecurity.com/advisories/other_advisory-1649.html
http://frontal2.mandriva.com/security/advisories?name=MDKSA-2001:077
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e@%3Ccvs.httpd.apache.org%3E
http://www.redhat.com/support/errata/RHSA-2001-126.html
http://www.redhat.com/support/errata/RHSA-2001-164.html
XForce ISS Database: apache-log-file-overwrite(7419)
https://exchange.xforce.ibmcloud.com/vulnerabilities/7419
Common Vulnerability Exposure (CVE) ID: CVE-2001-0731
BugTraq ID: 3009
http://www.securityfocus.com/bid/3009
Bugtraq: 20010709 How Google indexed a file with no external link (Google Search)
http://www.securityfocus.com/archive/1/20010709214744.A28765@brasscannon.net
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E
SGI Security Advisory: 20020301-01-P
ftp://patches.sgi.com/support/free/security/advisories/20020301-01-P
XForce ISS Database: apache-multiviews-directory-listing(8275)
https://exchange.xforce.ibmcloud.com/vulnerabilities/8275
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.