English | Deutsch | Español | Português
 ID de Usuario:
 Contraseña:
Nuevo usuario
 Acerca de:   Dedicada | Avanzada | Estándar | Periódica | Sin Riesgo | Escritorio | Básica | Individual | Sello | FAQ
  Resumen de Precio/Funciones | Ordenar  | Nuevas Vulnerabilidades | Confidencialidad | Búsqueda de Vulnerabilidad
 Búsqueda de    
Vulnerabilidad   
    Buscar 75096 Descripciones CVE y
39644 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.835247
Categoría:HP-UX Local Security Checks
Título:HP-UX Update for Apache-based Web Server HPSBUX02612
Resumen:Check for the Version of Apache-based Web Server
Descripción:

Vulnerability Insight:
Potential security vulnerabilities have been identified with HP-UX
Apache-based Web Server. These vulnerabilities could be exploited locally to
disclose information, increase privilege or remotely create a Denial of
Service (DoS).

Impact:
Local information disclosure
increase of privilege
remote Denial of Service (DoS)

Affected Software/OS:
Apache-based Web Server on
HP-UX B.11.11, B.11.23 and B.11.31 running Apache-based Web Server prior to
v2.0.63.01 HP-UX Apache-based Web Server v2.0.63.01 is contained in HP-UX
Web Server Suite v.2.32

Fix: Please Install the Updated Packages.

References:
http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02579879

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2010-1452
http://marc.info/?l=apache-announce&m=128009718610929&w=2
http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
HPdes Security Advisory: HPSBUX02612
http://marc.info/?l=bugtraq&m=129190899612998&w=2
HPdes Security Advisory: SSRT100345
http://www.redhat.com/support/errata/RHSA-2010-0659.html
http://www.redhat.com/support/errata/RHSA-2011-0896.html
http://www.redhat.com/support/errata/RHSA-2011-0897.html
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.467395
SuSE Security Announcement: SUSE-SU-2011:1000 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-09/msg00009.html
SuSE Security Announcement: SUSE-SU-2011:1216 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00008.html
http://ubuntu.com/usn/usn-1021-1
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11683
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12341
http://secunia.com/advisories/42367
http://www.vupen.com/english/advisories/2010/2218
http://www.vupen.com/english/advisories/2010/3064
http://www.vupen.com/english/advisories/2011/0291
Common Vulnerability Exposure (CVE) ID: CVE-2009-1956
http://www.mail-archive.com/dev@apr.apache.org/msg21591.html
http://www.mail-archive.com/dev@apr.apache.org/msg21592.html
http://www.openwall.com/lists/oss-security/2009/06/06/1
AIX APAR: PK88341
http://www-01.ibm.com/support/docview.wss?uid=swg1PK88341
AIX APAR: PK91241
http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241
AIX APAR: PK99478
http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478
http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html
https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html
http://security.gentoo.org/glsa/glsa-200907-03.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2009:131
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
http://www.redhat.com/support/errata/RHSA-2009-1107.html
http://www.redhat.com/support/errata/RHSA-2009-1108.html
http://www.ubuntu.com/usn/usn-786-1
http://www.ubuntu.com/usn/usn-787-1
BugTraq ID: 35251
http://www.securityfocus.com/bid/35251
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11567
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12237
http://secunia.com/advisories/34724
http://secunia.com/advisories/35487
http://secunia.com/advisories/35395
http://secunia.com/advisories/35565
http://secunia.com/advisories/35710
http://secunia.com/advisories/35284
http://secunia.com/advisories/35843
http://secunia.com/advisories/35797
http://secunia.com/advisories/37221
http://www.vupen.com/english/advisories/2009/1907
http://www.vupen.com/english/advisories/2009/3184
Common Vulnerability Exposure (CVE) ID: CVE-2009-1955
Bugtraq: 20090824 rPSA-2009-0123-1 apr-util (Google Search)
http://www.securityfocus.com/archive/1/archive/1/506053/100/0/threaded
http://www.milw0rm.com/exploits/8842
http://marc.info/?l=apr-dev&m=124396021826125&w=2
http://www.openwall.com/lists/oss-security/2009/06/03/4
AIX APAR: PK88342
http://www-01.ibm.com/support/docview.wss?uid=swg1PK88342
Debian Security Information: DSA-1812 (Google Search)
http://www.debian.org/security/2009/dsa-1812
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.538210
SuSE Security Announcement: SUSE-SR:2010:011 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html
BugTraq ID: 35253
http://www.securityfocus.com/bid/35253
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10270
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12473
http://secunia.com/advisories/35360
http://secunia.com/advisories/35444
http://secunia.com/advisories/36473
http://www.vupen.com/english/advisories/2010/1107
Common Vulnerability Exposure (CVE) ID: CVE-2009-1891
Bugtraq: 20091113 rPSA-2009-0142-2 httpd mod_ssl (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507857/100/0/threaded
http://marc.info/?l=apache-httpd-dev&m=124621326524824&w=2
http://marc.info/?l=apache-httpd-dev&m=124661528519546&w=2
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534712
AIX APAR: PK91361
http://www-01.ibm.com/support/docview.wss?uid=swg1PK91361
AIX APAR: PK99480
http://www-01.ibm.com/support/docview.wss?uid=swg1PK99480
Debian Security Information: DSA-1834 (Google Search)
http://www.debian.org/security/2009/dsa-1834
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01363.html
http://security.gentoo.org/glsa/glsa-200907-04.xml
HPdes Security Advisory: HPSBOV02683
http://marc.info/?l=bugtraq&m=130497311408250&w=2
HPdes Security Advisory: SSRT090208
http://www.mandriva.com/security/advisories?name=MDVSA-2009:149
RedHat Security Advisories: RHSA-2009:1148
https://rhn.redhat.com/errata/RHSA-2009-1148.html
http://www.redhat.com/support/errata/RHSA-2009-1156.html
SuSE Security Announcement: SUSE-SA:2009:050 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00006.html
http://www.ubuntu.com/usn/USN-802-1
http://osvdb.org/55782
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8632
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9248
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12361
http://www.securitytracker.com/id?1022529
http://secunia.com/advisories/35721
http://secunia.com/advisories/35781
http://secunia.com/advisories/35793
http://secunia.com/advisories/35865
http://secunia.com/advisories/37152
http://www.vupen.com/english/advisories/2009/1841
Common Vulnerability Exposure (CVE) ID: CVE-2009-1890
Bugtraq: 20091112 rPSA-2009-0142-1 httpd mod_ssl (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507852/100/0/threaded
AIX APAR: PK91259
http://www-01.ibm.com/support/docview.wss?uid=swg1PK91259
BugTraq ID: 35565
http://www.securityfocus.com/bid/35565
http://osvdb.org/55553
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8616
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9403
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12330
http://www.securitytracker.com/id?1022509
http://secunia.com/advisories/35691
Common Vulnerability Exposure (CVE) ID: CVE-2009-1195
http://marc.info/?l=apache-httpd-dev&m=124048996106302&w=2
Debian Security Information: DSA-1816 (Google Search)
http://www.debian.org/security/2009/dsa-1816
http://www.mandriva.com/security/advisories?name=MDVSA-2009:124
http://www.redhat.com/support/errata/RHSA-2009-1075.html
BugTraq ID: 35115
http://www.securityfocus.com/bid/35115
http://osvdb.org/54733
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11094
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:8704
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12377
http://www.securitytracker.com/id?1022296
http://secunia.com/advisories/35261
http://secunia.com/advisories/35264
http://secunia.com/advisories/35453
http://www.vupen.com/english/advisories/2009/1444
XForce ISS Database: apache-allowoverrides-security-bypass(50808)
http://xforce.iss.net/xforce/xfdb/50808
Common Vulnerability Exposure (CVE) ID: CVE-2009-0023
Bugtraq: 20091112 rPSA-2009-0144-1 apr-util (Google Search)
http://www.securityfocus.com/archive/1/archive/1/507855/100/0/threaded
BugTraq ID: 35221
http://www.securityfocus.com/bid/35221
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10968
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12321
XForce ISS Database: apache-aprstrmatchprecompile-dos(50964)
http://xforce.iss.net/xforce/xfdb/50964
Common Vulnerability Exposure (CVE) ID: CVE-2007-6203
Bugtraq: 20071130 PR07-37: XSS on Apache HTTP Server 413 error pages via malformed HTTP method (Google Search)
http://www.securityfocus.com/archive/1/archive/1/484410/100/0/threaded
http://procheckup.com/Vulnerability_PR07-37.php
AIX APAR: PK57952
http://www-1.ibm.com/support/docview.wss?uid=swg1PK57952
AIX APAR: PK65782
http://www-1.ibm.com/support/docview.wss?uid=swg24019245
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
http://security.gentoo.org/glsa/glsa-200803-19.xml
HPdes Security Advisory: HPSBUX02465
http://marc.info/?l=bugtraq&m=125631037611762&w=2
HPdes Security Advisory: SSRT090192
SuSE Security Announcement: SUSE-SA:2008:021 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00004.html
http://www.ubuntu.com/usn/USN-731-1
BugTraq ID: 26663
http://www.securityfocus.com/bid/26663
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12166
http://secunia.com/advisories/34219
http://www.vupen.com/english/advisories/2007/4060
http://www.vupen.com/english/advisories/2007/4301
http://www.vupen.com/english/advisories/2008/0924/references
http://www.vupen.com/english/advisories/2008/1623/references
http://www.vupen.com/english/advisories/2008/1875/references
http://www.securitytracker.com/id?1019030
http://secunia.com/advisories/27906
http://secunia.com/advisories/28196
http://secunia.com/advisories/29348
http://secunia.com/advisories/29420
http://secunia.com/advisories/29640
http://secunia.com/advisories/30356
http://secunia.com/advisories/30732
http://secunia.com/advisories/33105
http://securityreason.com/securityalert/3411
XForce ISS Database: apache-413error-xss(38800)
http://xforce.iss.net/xforce/xfdb/38800
Common Vulnerability Exposure (CVE) ID: CVE-2006-3918
Bugtraq: 20060508 Unfiltered Header Injection in Apache 1.3.34/2.0.57/2.2.1 (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2006-05/0151.html
Bugtraq: 20060724 Write-up by Amit Klein: "Forging HTTP request headers with Flash" (Google Search)
http://archives.neohapsis.com/archives/bugtraq/2006-07/0425.html
AIX APAR: PK24631
http://www-1.ibm.com/support/docview.wss?uid=swg1PK24631
AIX APAR: PK27875
http://www-1.ibm.com/support/docview.wss?uid=swg24013080
Debian Security Information: DSA-1167 (Google Search)
http://www.debian.org/security/2006/dsa-1167
OpenBSD Security Advisory: [3.9] 012: SECURITY FIX: October 7, 2006
http://openbsd.org/errata.html#httpd2
RedHat Security Advisories: RHSA-2006:0618
http://rhn.redhat.com/errata/RHSA-2006-0618.html
http://www.redhat.com/support/errata/RHSA-2006-0619.html
RedHat Security Advisories: RHSA-2006:0692
http://rhn.redhat.com/errata/RHSA-2006-0692.html
SGI Security Advisory: 20060801-01-P
ftp://patches.sgi.com/support/free/security/advisories/20060801-01-P
SuSE Security Announcement: SUSE-SA:2006:051 (Google Search)
http://www.novell.com/linux/security/advisories/2006_51_apache.html
http://www.ubuntu.com/usn/usn-575-1
BugTraq ID: 19661
http://www.securityfocus.com/bid/19661
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10352
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:12238
http://www.securitytracker.com/id?1024144
http://secunia.com/advisories/40256
http://www.vupen.com/english/advisories/2006/2963
http://www.vupen.com/english/advisories/2006/2964
http://www.vupen.com/english/advisories/2006/3264
http://www.vupen.com/english/advisories/2006/4207
http://www.vupen.com/english/advisories/2006/5089
http://securitytracker.com/id?1016569
http://secunia.com/advisories/21172
http://secunia.com/advisories/21174
http://secunia.com/advisories/21399
http://secunia.com/advisories/21478
http://secunia.com/advisories/21848
http://secunia.com/advisories/21598
http://secunia.com/advisories/21744
http://secunia.com/advisories/21986
http://secunia.com/advisories/22140
http://secunia.com/advisories/22317
http://secunia.com/advisories/22523
http://secunia.com/advisories/28749
http://securityreason.com/securityalert/1294
http://www.vupen.com/english/advisories/2010/1572
CopyrightCopyright (c) 2010 Greenbone Networks GmbH

Esta es sólo una de 39644 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.

Registro de Nuevo Usuario
Email:
Usuario:
Contraseña:
Envíeme por email sus boletines mensuales, informándome los últimos servicios, mejoras y encuestas.
Por favor envíeme por email un anuncio de prueba de vulnerabilidades siempre que se agregue una nueva prueba.
   Privacidad
Ingreso de Usuario Registrado
 
Usuario:   
Contraseña:  

 ¿Olvidó su usuario o contraseña??
Email/ID de Usario:




Principal | Acerca de Nosotros | Contáctenos | Programas de Asociado | Privacidad | Listas de Correo | Abuso
Auditorías de Seguridad | DNS Administrado | Monitoreo de Red | Analizador de Sitio | Informes de Investigación de Internet
Prueba de Web | Whois

© 1998-2014 E-Soft Inc. Todos los derechos reservados.